diff --git a/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00b8c42cd65eb734cc2df12c44e0b6fa007e1554 --- /dev/null +++ b/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.153 + 100.64.6.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366484 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3da99d90-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90deb722d859f5c0288bd7fac78c199bf8248085 --- /dev/null +++ b/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.27 + USER-0015-1855.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3daaa090-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be8321025353dfda4baeb7a115a51da2b02a28a7 --- /dev/null +++ b/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3dab9a60-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a839a1aee893d63a5a2b323db8ecb3ddbe6d046 --- /dev/null +++ b/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.27 + USER-0015-1855.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199028 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3adafa8214bc0436321f1c02565774e1a767d48c --- /dev/null +++ b/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.113 + 100.64.60.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3dbe8620-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e13b1a70cff208e626abe5211325bf6e068824e7 --- /dev/null +++ b/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.91 + 100.64.68.91 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710791201 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3dc1db80-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791201 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3dc1db80-e560-11ee-be14-8bb84b2c14a8 + + + diff --git a/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d38a6a1a34f2d814dbf673f80cb0bfbfc0e35524 --- /dev/null +++ b/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.207 + USER-0015-1237.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300902 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3dc34570-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ce60e34302e0a5b1925f3bf7a390cd294694d41 --- /dev/null +++ b/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.109 + 100.64.27.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497750 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3dc401b0-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b4bcb12588e7f7d681361e3ca45c34d56665c9a --- /dev/null +++ b/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.123 + 100.64.26.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.124 + 100.64.26.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.125 + 100.64.26.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.126 + 100.64.26.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.127 + 100.64.26.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.128 + 100.64.26.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.129 + 100.64.26.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dc46700-94e4-11ee-b216-b792b1d50feb + + + diff --git a/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5672ef99bd50a3609aaae9482c4eb3b523fab064 --- /dev/null +++ b/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.174 + 100.64.69.174 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713538262 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3dcc0050-fe5c-11ee-894d-f3eebee8c21c + + + diff --git a/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c65158211be635c4c0bf63d12c15f6effbb417cc --- /dev/null +++ b/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.113 + 100.64.60.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dd01250-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..159152e315c0105ec8c72e8a7315b1b37139fdc1 --- /dev/null +++ b/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.69.174 + 100.64.69.174 + ["Exploiting Host"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713538262 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3dd04610-fe5c-11ee-894d-f3eebee8c21c + + + diff --git a/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcd61ec82b8210ccd448ed523ff66ab394753937 --- /dev/null +++ b/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.111 + 100.64.27.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3dd19640-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b01c188b9051194d81c14b48cc679f8fab913e67 --- /dev/null +++ b/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.113 + 100.64.27.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ddc92c0-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dd4744f09d3d3252b31df55a8218d324bada5c4 --- /dev/null +++ b/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ddf0c60-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5b1e610ab8c227d9e5e41058809b8ed7a88558d --- /dev/null +++ b/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197595 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ddfc780-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b5282b868508b220936af5900d2c4c907ada517 --- /dev/null +++ b/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.243 + 100.64.28.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3de60b50-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e49ccab1738a12efd4e962a1d8327be5afe3b64 --- /dev/null +++ b/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.113 + 100.64.27.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3de76830-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0261f3b34f8c503140c3bbd45b7869ce2af20559 --- /dev/null +++ b/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.126 + 100.64.2.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.152 + 100.64.51.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.153 + 100.64.51.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.129 + 100.64.6.129 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.85 + 100.64.47.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.112 + 100.64.3.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529970 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df08610-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6eab49fe991db7038462cb097b493a4af16ce330 --- /dev/null +++ b/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.115 + 100.64.27.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3df39d30-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..093f4f5877c0ca72d9f08e8e1e516373ff6ed33a --- /dev/null +++ b/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.121 + 100.64.18.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692521 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3df410a0-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c10ad77514cf259eda9fd5cb05cc30c2b839b19 --- /dev/null +++ b/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.121 + 100.64.13.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dfacad0-2b9d-11ee-a75c-6705ed43e196 + + + INCIDENT_LINK + 1690366484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3dfacad0-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d3e325a95aacbc0a61fa757b1de097af5ac912e --- /dev/null +++ b/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.115 + 100.64.27.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3dfe99b0-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53f5b4cc9a21f45576e08a65ca2b976aa0614f2d --- /dev/null +++ b/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.28 + 100.64.81.28 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199029 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3dffec80-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae48ee3f72f744022644c3046d83570e0e0c7541 --- /dev/null +++ b/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e007710-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa5868afa0d45640bd66a363f545773a5c9d4346 --- /dev/null +++ b/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.121 + 100.64.18.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692521 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e02b6a0-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe410ae486cad5a329d56a2c79a89760ba11050a --- /dev/null +++ b/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690805430 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e0845f0-2f9b-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805430 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e0845f0-2f9b-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3aad5c28d53035dc2a4ea66a6bbe5ad5379ba89b --- /dev/null +++ b/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.32 + 100.64.27.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e1025e0-90da-11ee-ac7c-5360e2814c47 + + + INCIDENT_LINK + 1701497751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e1025e0-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0db674bbcecea0b271196acc7f9dc876a6012687 --- /dev/null +++ b/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.140 + 100.64.5.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692521 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e11d1d0-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml new file mode 100644 index 0000000000000000000000000000000000000000..652c96e9688216fc537d2c00bc1c5bd11073b32b --- /dev/null +++ b/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.108 + 100.64.70.108 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.109 + 100.64.70.109 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070235 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180 + + + diff --git a/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36986d6cf87b83a91c1505578b9d18bb398ef9e0 --- /dev/null +++ b/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.96 + 100.64.16.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e182a60-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c867740030a2caacc0a3af4c4a999efd910234e --- /dev/null +++ b/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.32 + 100.64.27.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e1ca900-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..720541b254db73372774698ee061f6cdde4bb333 --- /dev/null +++ b/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.148 + 100.64.91.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1676434040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e201960-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6506baf19c4cfb292a90578f845acc123d46d129 --- /dev/null +++ b/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.140 + 100.64.5.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692521 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e209ee0-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml b/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..384ff3bf1aff29759ad8bb13378782fba71f1700 --- /dev/null +++ b/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.228 + 100.64.70.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670946360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e22b550-7afd-11ed-bc1d-99c452878324 + + + diff --git a/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60553aafb13f61aa288bda28694e92b1c005ea97 --- /dev/null +++ b/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.91.148 + 100.64.91.148 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676434040 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e24d450-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bcc1e6721371732001983c5a32e472cc9d2c2cf --- /dev/null +++ b/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.144 + 100.64.43.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e26bda0-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..591574491785e8ebaebcb3b74b29482dee060325 --- /dev/null +++ b/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.117 + 100.64.27.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701497751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e273050-90da-11ee-ac7c-5360e2814c47 + + + diff --git a/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a494bd731a5fbf7c2d5c8fa1a14ad4e369e57711 --- /dev/null +++ b/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.150 + 100.64.91.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676434040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e279370-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ce21fedef50b96214356fceb0057b20d116991c --- /dev/null +++ b/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.96 + 100.64.16.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961538 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e291a50-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21e1ae326c76bced030371e032f7a963288fdfbf --- /dev/null +++ b/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.124 + 100.64.91.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695315146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e2ec180-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6bd84c713164b10ec2f62b3a3828482502640bd --- /dev/null +++ b/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml @@ -0,0 +1,259 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.88 + 100.64.18.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.37 + 100.64.30.37 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.41 + 100.64.11.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.38 + 100.64.30.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + INCIDENT_LINK + 1689300474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e305490-21eb-11ee-a8c2-a10defe0b4b5 + + + diff --git a/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b7bbfec4f18dc26af6ba7fc7a9473750ee678df --- /dev/null +++ b/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.144 + 100.64.43.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398932 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e367510-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81b79814fcec1e5ac583555dde479e363a35e611 --- /dev/null +++ b/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.124 + 100.64.91.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315146 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3b6bb0-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66b4ab25643c6a58c8d2a28a753325469ac5967f --- /dev/null +++ b/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.118 + 100.64.16.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.2 + 100.64.71.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667786123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e3d9fd0-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e3d9fd0-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd7eda9aac3b2a7852090735a50ec591f18a718f --- /dev/null +++ b/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.45 + USER-0015-1898.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.71 + 100.64.81.71 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.129 + USER-0015-1899.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.130 + 100.64.81.130 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.131 + 100.64.81.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.29 + USER-0015-1894.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.132 + 100.64.81.132 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e3ebbf0-0745-11ed-9d26-9564153a7999 + + + diff --git a/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06a9f891d32c7930b52df39a3a77e76995b3ecdc --- /dev/null +++ b/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.3 + 100.64.62.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.133 + 100.64.81.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222949 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4090b0-0745-11ed-9d26-9564153a7999 + + + diff --git a/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5108ff051b71db7251e67780978e16e2be9cbf4 --- /dev/null +++ b/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.63 + 100.64.5.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398932 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e451b10-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df591aebd688e18e7c7e53b8d880669ac4ff6340 --- /dev/null +++ b/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.127 + 100.64.13.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685221973 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e4bd6d0-fcd3-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..177961c5d943dc768cb70088fe11bede7eb2f7c4 --- /dev/null +++ b/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.10 + 100.64.83.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.11 + 100.64.83.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013916 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e4d3400-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..030eb3f811ced0b793989e0a5a7a207b1f17a6c1 --- /dev/null +++ b/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.10 + 100.64.97.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.91 + 100.64.90.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599521 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e616dd0-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c84ec45afd4e889c09309aa85ed40e5659c4465 --- /dev/null +++ b/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.146 + 100.64.43.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e665eb0-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83a213d2ce6489ae6a8e766c80d4539eaede1559 --- /dev/null +++ b/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.137 + 100.64.26.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.103 + 100.64.26.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.138 + 100.64.26.138 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.141 + 100.64.26.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.142 + 100.64.26.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.118 + 100.64.12.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.104 + USER-0015-1261.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.246 + 100.64.13.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e69f5d0-94e4-11ee-b216-b792b1d50feb + + + diff --git a/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4128db1a21d3429d436b2210e1f75c34aee78e3e --- /dev/null +++ b/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + USER-0015-1740.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.134 + 100.64.81.134 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.135 + 100.64.81.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.136 + 100.64.81.136 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.137 + 100.64.81.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.138 + 100.64.81.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.90 + USER-0015-1841.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.106 + 100.64.73.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e6fde10-0745-11ed-9d26-9564153a7999 + + + diff --git a/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51f16890ce4efd87fe7eeecf33117adaa4880181 --- /dev/null +++ b/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.30 + 100.64.55.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e71a690-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eabd59a8fc358a19577310acd0816a2acf2199a --- /dev/null +++ b/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.20 + 100.64.19.20 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903917 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e74ad20-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2edc35b0b9da2caa00ed8bc14dc734d503b28114 --- /dev/null +++ b/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.146 + 100.64.43.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e77eae0-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cfa4b1d685170d24e8573229b51f437ce84dec5 --- /dev/null +++ b/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.30 + 100.64.55.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e81fa40-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e8062e1dccb3150f2f75d70a6a2fa3e12f8a50b --- /dev/null +++ b/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.232 + 100.64.69.232 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713663676 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e8c4160-ff80-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663676 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e8c4160-ff80-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml b/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd4c95ef6c699b9e0d8c85e19a4681d98365f371 --- /dev/null +++ b/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.150 + 100.64.29.150 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1703818752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14 + + + INCIDENT_LINK + 1703818752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14 + + + diff --git a/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..724e8226bcd9aabe834bbe46ab4a3c73334b1b17 --- /dev/null +++ b/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.20 + 100.64.19.20 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903917 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3e91d210-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..885aadecb051131d8623d9e70cac24c531eb6ae4 --- /dev/null +++ b/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.111 + 100.64.73.111 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.3 + 100.64.72.3 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e9439d0-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3e9439d0-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c64c0ceedbc4c5507e6f1c1b4d3342a42b4444ef --- /dev/null +++ b/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.111 + 100.64.57.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756600 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3e96e500-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac44e880ebfaf70d1dd5ba1c611bbe2f2ebab5ea --- /dev/null +++ b/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.92 + 100.64.32.92 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.34 + 100.64.27.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.93 + 100.64.32.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.94 + 100.64.32.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ea94240-6590-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6932c4f8b0d1507bfdb7bf10cfbcc0c7c651aa9 --- /dev/null +++ b/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1696189172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eb253b0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eb253b0-6092-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45fc6199c6b012595db3663c1d9cab23202de894 --- /dev/null +++ b/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,811 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.179 + 100.64.21.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.98 + 100.64.32.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.54 + 100.64.32.54 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.99 + 100.64.32.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.101 + 100.64.32.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.244 + 100.64.17.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.102 + 100.64.32.102 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.103 + 100.64.32.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.104 + 100.64.32.104 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.105 + 100.64.32.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.106 + 100.64.32.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.240 + 100.64.31.240 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.107 + 100.64.32.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.108 + 100.64.32.108 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738069 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49a570db4bbd26cc92a9380d0260414182b04fe9 --- /dev/null +++ b/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.98 + 100.64.16.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ec6b9e0-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b13b0710acb401edd4a3c3df112c0d321324d88 --- /dev/null +++ b/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.251 + 100.64.56.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.252 + 100.64.56.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.253 + 100.64.56.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.254 + 100.64.56.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.84 + 100.64.12.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.255 + 100.64.56.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.189 + 100.64.7.189 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.83 + 100.64.6.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.14 + 100.64.6.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.1 + 100.64.57.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.1 + 100.64.57.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.181 + 100.64.31.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.2 + 100.64.57.2 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.3 + 100.64.57.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197596 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ecb11e0-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66ce6226810c7ede096bd5eeb40955af087747ca --- /dev/null +++ b/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.152 + 100.64.68.152 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1704120259 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ed28df0-a8b4-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120259 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ed28df0-a8b4-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..788678b04cbb68f353a622ce0aadc7720c623915 --- /dev/null +++ b/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.98 + 100.64.16.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ed62330-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec0021ad222b331416c2858f10622a6f3ce83027 --- /dev/null +++ b/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.35 + 100.64.68.35 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1701115500 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ee49a50-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115500 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ee49a50-8d60-11ee-9951-411438339097 + + + diff --git a/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43822e79990ca01d09f697cd0c2da8321d2f454d --- /dev/null +++ b/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.12 + 100.64.57.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197596 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ee7c1a0-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90b9a46e13c8802a98f6b31914a45f854ec381c1 --- /dev/null +++ b/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.65 + 100.64.72.65 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.112 + 100.64.71.112 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.139 + 100.64.81.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.140 + 100.64.81.140 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.141 + 100.64.81.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.142 + 100.64.81.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.143 + 100.64.81.143 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3eeab360-0745-11ed-9d26-9564153a7999 + + + diff --git a/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f75746641e637e02eba9898ecb99411c81bced8 --- /dev/null +++ b/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.140 + 100.64.78.140 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.1 + 100.64.81.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + USER-0015-1630.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.144 + 100.64.81.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.31 + 100.64.75.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.145 + 100.64.81.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.41 + 100.64.71.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + INCIDENT_LINK + 1658222950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3eecaf30-0745-11ed-9d26-9564153a7999 + + + diff --git a/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a3a858b9f0bff39ebc98c9f019126b206503bdf --- /dev/null +++ b/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.37 + 100.64.68.37 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1701115500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ef34050-8d60-11ee-9951-411438339097 + + + diff --git a/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..472c2838d232eb7ea4af3644a06dc644a712bf1e --- /dev/null +++ b/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.198 + 100.64.86.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.134 + USER-0015-1990.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719755658 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755658 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755658 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755658 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a + + + diff --git a/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..578d0952b0c9f9f0a1c286dcb86ce41cf8661dce --- /dev/null +++ b/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.129 + 100.64.94.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1706165093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3efd7d20-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9acc85b8a4f149b779ce762d92c4b1409947cd6e --- /dev/null +++ b/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3f08f840-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef46515ad832314a27444524a8eda019826adc13 --- /dev/null +++ b/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.53 + 100.64.80.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1677324388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..008558de55f50b760d4e5a121561f0d1f06c38c0 --- /dev/null +++ b/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.129 + 100.64.94.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706165094 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f0b11b0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a56e7792bef63cc9e71720f4c80093cbe4e9e35b --- /dev/null +++ b/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.18 + 100.64.41.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077663 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f0c4650-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8cbfe82c4fd993e12219e3beec59a2441dbc9ec --- /dev/null +++ b/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.21 + 100.64.92.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666302214 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f135d50-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd508345d178bbc8896bbddce15b2941a8cbf5d9 --- /dev/null +++ b/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f14df50-2f13-11ed-acc5-dbb3944f5f62 + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f14df50-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20c090b3f9e4e3a283b544689783a6ba680fb1dc --- /dev/null +++ b/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.170 + 100.64.10.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f15c980-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..325416333604abc179371c6f9f3c0c4cf206a4c5 --- /dev/null +++ b/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.21 + 100.64.92.21 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302214 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f172de0-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml b/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1f3e1bb53a4d75c2addf7395031401a9092c364 --- /dev/null +++ b/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.167 + 100.64.37.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1714333692 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f184de0-0598-11ef-8baf-8702a266b8b0 + + + diff --git a/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8382f4b0cf2d4759ec88b32dfa8acd6872641595 --- /dev/null +++ b/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3f1bbd20-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d113f17222ffc6969f5a33063cc937251d52134 --- /dev/null +++ b/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.19 + 100.64.97.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f22e910-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89b13430ba7380c229eb2957e1df7c2dbb9e545f --- /dev/null +++ b/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.170 + 100.64.10.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332757 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f24bda0-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7df07558ca34abbed6041cf655ba57057b75814e --- /dev/null +++ b/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.19 + 100.64.97.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3f2aff60-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9c713dd8c3fc1651b68578bf15590b900da8eb4 --- /dev/null +++ b/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.18 + 100.64.41.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685077663 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f2d3bd0-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..917826ddb34b8552bac39eb684534076c8370133 --- /dev/null +++ b/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.12 + 100.64.97.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3f3363d0-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0e1ffeb5db3c822c0b0fb9c7546a3c766ade319 --- /dev/null +++ b/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.109.195.54 + 10.109.195.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f353890-2f13-11ed-acc5-dbb3944f5f62 + + + INCIDENT_LINK + 1662599522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f353890-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5c54bbc84e09e4c9b8d3d126dbe5c8730d394d6 --- /dev/null +++ b/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332757 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f370d20-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..077b80f3cdb24653d9164265c511aed1a1b89a16 --- /dev/null +++ b/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.23 + 100.64.97.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662599523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9aecd822e6321ee3349742831d3840187b93961 --- /dev/null +++ b/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927935 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f40e650-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dc39c4325ba58f99e8b46c5d427d154be2dc323 --- /dev/null +++ b/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.23 + 100.64.97.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662599523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3f453e20-2f13-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml b/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d22b4a9172cd5f3b4b67e1cd61fc0a2310d1c76b --- /dev/null +++ b/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.217 + 100.64.84.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661912757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f4a38c0-28d4-11ed-a202-d194a49bb9df + + + INCIDENT_LINK + 1661912757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f4a38c0-28d4-11ed-a202-d194a49bb9df + + + diff --git a/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f3dd75dad5afebfcc5aa4cf119dd13d935d3dc4 --- /dev/null +++ b/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.14 + 100.64.57.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197597 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f4c4fd0-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfae66f4c3e94b68427d01a196e8dd25b067eced --- /dev/null +++ b/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.106 + 100.64.85.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774855 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f518db0-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08bdc672dee1fbe25f4a8cd6c41346712df760f2 --- /dev/null +++ b/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f564310-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78fba9017976d484d77c1c2c7275261968daa39b --- /dev/null +++ b/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.14 + 100.64.57.14 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f5d66d0-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc86531d633baec128c440f5ab647db84c965c1d --- /dev/null +++ b/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.153 + 100.64.68.153 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1704120260 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f5e7a40-a8b4-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120260 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3f5e7a40-a8b4-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3ea8d78343055faaac83ad9efb6466d777cf627 --- /dev/null +++ b/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.122 + 100.64.76.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + 100.64.1.158 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.123 + 100.64.76.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.124 + 100.64.76.124 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f663770-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86bd44ef280c0d74565b94f1570cfdac5d807541 --- /dev/null +++ b/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.133 + 100.64.69.133 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692425064 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425064 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425064 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425064 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..425be38d6f8fac4f671dbe645abafc336309c686 --- /dev/null +++ b/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.246 + 100.64.70.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.59 + 100.64.1.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.213 + 100.64.73.213 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.109 + 100.64.73.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.125 + 100.64.76.125 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.36 + 100.64.1.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f746840-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a121f2dc53bfe4ffc92fcd18f9f713bfb64f1c32 --- /dev/null +++ b/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.140 + 100.64.71.140 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.141 + 100.64.71.141 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.18.93 + 100.64.18.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670201615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f7970a0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f7970a0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f7970a0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3f7970a0-7437-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac2f460cba285212047523a901ce6fc5e06b3aeb --- /dev/null +++ b/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.51 + 100.64.26.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.52 + 100.64.26.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.53 + 100.64.26.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.54 + 100.64.26.54 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719129024 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3f8e8ff0-3135-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b39ee472eea852ae94db7ee88cdb34803dc868a9 --- /dev/null +++ b/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629609 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3fa5e190-920d-11ee-afdd-6dc3cf6fdc52 + + + INCIDENT_LINK + 1701629609 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3fa5e190-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20b30d07530cf0ada89a4d6f038f96eacb61e5ba --- /dev/null +++ b/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.42.189 + USER-0015-1969.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.108 + 100.64.85.108 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774855 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3fab9490-402d-11ef-b594-eb5862a3661d + + + INCIDENT_LINK + 1720774855 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3fab9490-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42745a10c85c4daa1a4af7868c4c07bcb52f0290 --- /dev/null +++ b/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629609 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c15989795ee127274cd409feae3a3715190df4b --- /dev/null +++ b/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.28 + 100.64.72.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1669055718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3fca6620-69cb-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669055718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3fca6620-69cb-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76b029a0682324dfd5509b5daddc91f294e80592 --- /dev/null +++ b/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.126 + 100.64.91.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3fe4d5f0-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7e43f133a616b18ef9ce21b24b3d21a541c4ab8 --- /dev/null +++ b/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.100 + 100.64.16.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3fff8800-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d3208d6f63880799b7aa6020b68caac29ac5bc6 --- /dev/null +++ b/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.132 + 100.64.69.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692424636 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40007c60-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424636 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40007c60-3e55-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd3674a5feb8e91e3ee4818af2eec9028f288c60 --- /dev/null +++ b/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.100 + 100.64.16.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 400f3f70-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12106164cf8645ee77431d03c241e63a6f1a85af --- /dev/null +++ b/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332758 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40131540-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5193c85fa0332b5da6d2c9d4d3dbe81c9507af7 --- /dev/null +++ b/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709026402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40131ba0-d553-11ee-9e46-fb4031711de5 + + + diff --git a/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61e04e4e76aa4f16a676b27920eb3c98d8979953 --- /dev/null +++ b/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332758 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 40247a60-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13d168c3df0b3eef68b02d7c7b836a5b16b14353 --- /dev/null +++ b/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.202.17 + HOST-14114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.126 + 100.64.76.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660685687 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40340ec0-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685687 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40340ec0-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..001ec7e0ad5b464a58a6e7326eee4475a6d0549a --- /dev/null +++ b/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.53 + 100.64.94.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.190.96.179 + 100.64.94.50 + [] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664674852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host"] + complete-mission + Unprocessed + 403b7450-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c737f5c9ef834425147bc9b9fce020960f4e7dd5 --- /dev/null +++ b/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.94 + 100.64.64.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671666 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 403b8850-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58a2b78505c4ecaa630089a316843d08b6424e81 --- /dev/null +++ b/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.210 + 100.64.29.210 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 40442d20-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..680af670e03bfc65c2ce759f4b89cb6b27cedef7 --- /dev/null +++ b/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + 100.64.94.50 + [] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.53 + 100.64.94.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664674852 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host"] + complete-mission + Disrupted + 4047f770-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38315542dbe10cbb9e987f1acc3f8b0034d85a4b --- /dev/null +++ b/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.94 + 100.64.64.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671666 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40499210-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0000e93a2cca6fd69ff60e09cc3ae55deaf08b0d --- /dev/null +++ b/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.76.19 + 100.64.76.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664674853 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 405034d0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a67d200286864f8f6e194fca6781c3b5f788c7b --- /dev/null +++ b/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.54 + 100.64.94.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.190.96.179 + 100.64.94.50 + [] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1664674853 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40540560-41f3-11ed-a891-2d9e83e3a063 + + + INCIDENT_LINK + 1664674853 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40540560-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04f398624cd7407d95cda73ba79e35443d21a427 --- /dev/null +++ b/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + 100.64.94.50 + [] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.54 + 100.64.94.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664674853 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4057d5f0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f36aa2c01d402be6a4b6fc2c8050357e49d68c80 --- /dev/null +++ b/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.130 + 100.64.49.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927938 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 409c7eb0-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..598e647fc69ca65fae963457d0aa0724167bc34b --- /dev/null +++ b/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.32 + 100.64.27.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40a213f0-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0f667c35e3efc883de2e4c3167270e81184d421 --- /dev/null +++ b/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.130 + 100.64.49.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 40b732a0-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c949672a001c24c6282978ff6d14f3945ceee528 --- /dev/null +++ b/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.40.46 + 100.64.40.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935260 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40bdf940-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69d16dfb602157e4256303fd16392ae430e06ee4 --- /dev/null +++ b/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.138 + 100.64.85.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.65.162 + USER-0015-1991.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719755661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40c35370-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40c35370-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40c35370-36e8-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40c35370-36e8-11ef-997a-f7dc07e23a4a + + + diff --git a/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96fb22aab8553b22dc5b270d0f18ac19f46339ee --- /dev/null +++ b/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.113 + 100.64.57.113 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756603 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40c3fe30-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f330fca7b2da5c2e5b3d8ad60d8d802a3f4f560a --- /dev/null +++ b/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.19.255.8 + 172.19.255.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.91.128 + 100.64.91.128 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40cc9de0-589f-11ee-a130-b3fc4de2b604 + + + INCIDENT_LINK + 1695315150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 40cc9de0-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..076bb0f2c66780ccf2322298a3f7e635f43f7d92 --- /dev/null +++ b/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.148 + 100.64.43.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40df4df0-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f94992cc42f5a94ee73e1751ef033a6b7238dd96 --- /dev/null +++ b/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.246 + 100.64.48.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40e10820-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a8497859b0c4553a672f642a4560dfc67db905e --- /dev/null +++ b/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,781 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.89 + 100.64.70.89 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.70.90 + 100.64.70.90 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.91 + 100.64.70.91 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.222 + 100.64.14.222 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.92 + 100.64.70.92 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.38.254 + USER-0015-1581.example.internal + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.101 + 100.64.17.101 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.93 + 100.64.70.93 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.2.14 + 100.64.2.14 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.69.159 + 100.64.69.159 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.94 + 100.64.70.94 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.95 + 100.64.70.95 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","CASB"] + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073849 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 40e46b40-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f872831a1b15897e502dd2fda75db0c9ad0000be --- /dev/null +++ b/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.127 + 100.64.10.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40ef38f0-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..879ffd57910dae060c040a0fc2107c3c0b409336 --- /dev/null +++ b/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.148 + 100.64.43.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40f19d70-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3604d6e7f3d7c0d984b2e1591e9e680b511dbb25 --- /dev/null +++ b/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.127 + 100.64.10.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179132 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 40fe2d10-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b63482d74b31105edab034127b5b07d659b7dc75 --- /dev/null +++ b/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.150 + 100.64.43.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 40fff550-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb2a7717f025d6d1e54fde12868e147efb9a8942 --- /dev/null +++ b/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.66 + 100.64.40.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 410301f0-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1f153027a931e249ab4e536203096682f0529e0 --- /dev/null +++ b/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.1 + 100.64.40.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685893710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4104ffb0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4104ffb0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5eaae847bb4232b42a7bc6d43c0fed0568844b1 --- /dev/null +++ b/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.201 + 100.64.22.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.147 + 100.64.24.147 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.168 + 100.64.55.168 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4105c9e0-1329-11ef-aba1-33e212db0be8 + + + diff --git a/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..286698b18d053c31cc9cfb54f73405c32ba5a38e --- /dev/null +++ b/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475186 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4106d860-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8adc31afa879dacb1672fa78222657ca2671fd3 --- /dev/null +++ b/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.54 + 100.64.80.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + HOST-15491 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324391 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4106fab0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4106fab0-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce18f7fa02525f0d1430ea0111e051bd772a02cb --- /dev/null +++ b/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.55 + 100.64.80.55 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.56 + 100.64.80.56 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.35 + 100.64.78.35 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.80.57 + 100.64.80.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324391 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d967114ef00417b684b45a1ed507e54f4a52a43 --- /dev/null +++ b/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.150 + 100.64.43.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698398937 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41104900-74ab-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67a29c6b57a46f1ef1a07621ba88df6c63f185e0 --- /dev/null +++ b/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.230 + 100.64.48.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.17.53 + 100.64.17.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.30.108 + 100.64.30.108 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.230 + 100.64.14.230 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.122 + 100.64.70.122 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.39.126 + 100.64.39.126 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129220 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41123760-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9248a3f71e9dda99c0dad64df2b14ea44c7cd84 --- /dev/null +++ b/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.165 + 100.64.20.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4112fef0-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1da4a94ef9a623f9e2ea82db22e3e7908cd3b004 --- /dev/null +++ b/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.66 + 100.64.40.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4113a3c0-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8377609bccd800767c009715e02901ee0c478c9f --- /dev/null +++ b/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml @@ -0,0 +1,929 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.50 + 100.64.37.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.254 + 100.64.12.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.51 + 100.64.37.51 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.52 + 100.64.37.52 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.53 + 100.64.37.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.54 + 100.64.37.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.1 + 100.64.30.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.55 + 100.64.37.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.56 + 100.64.37.56 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.57 + USER-0015-1310.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.179 + 100.64.29.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 411f5930-4e14-11ee-a329-837d93fb4fa8 + + + diff --git a/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ee4ee1bd2ea12b0dd2a18e2ef155084632b4334 --- /dev/null +++ b/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.132 + 100.64.64.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 412abc90-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml new file mode 100644 index 0000000000000000000000000000000000000000..389844a7829b9506e2750d9bccf736631bf48cff --- /dev/null +++ b/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.249 + 100.64.69.249 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1698888993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 412f7e50-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698888993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 412f7e50-7920-11ee-91ac-9dbe9218e297 + + + diff --git a/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e1f25085184d0d0dea1b5c0fbeddf35a3e1ef3e --- /dev/null +++ b/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.23 + 100.64.89.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659419962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 412fb1f0-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbbade7a87dfe40ffa28f17291f9b68a273e6bf6 --- /dev/null +++ b/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.23 + 100.64.89.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659419962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4133d0a0-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6936ff91d7eafadaafbf69125250e094001ebb2a --- /dev/null +++ b/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.211.14 + 192.168.211.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.77.37 + 100.64.77.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.38 + 100.64.77.38 + [] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689001978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41344890-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41344890-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41344890-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41344890-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1392731c9280d1b65cb596d30ace6c8f73b337f1 --- /dev/null +++ b/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.27 + 100.64.89.27 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1659419962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4136dde0-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b29a1e23ad051b93f45ba706afcf7179b7c15115 --- /dev/null +++ b/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.132 + 100.64.64.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 413a9b10-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42bfb94dabb97c1f1e71ec5592e60e7abc2a0a4f --- /dev/null +++ b/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.27 + 100.64.89.27 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659419962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 413b23a0-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4c460865e3f7bac0f9ee518f0107d9251c38cdb --- /dev/null +++ b/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.185 + 100.64.92.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696783171 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 413fb3e0-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d54a6e48b12b4a1cf5777f3da3223d95640b79f --- /dev/null +++ b/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.34 + 100.64.27.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167307 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 414c36a0-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38c6e49fe8a93ffbba3f60bfc9b9de21ad50cb9f --- /dev/null +++ b/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.185 + 100.64.92.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696783171 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41511900-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0190ada083168828f752f5d9edba66b05a2931a8 --- /dev/null +++ b/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.36 + 100.64.14.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.37 + 100.64.14.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.38 + 100.64.14.38 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.39 + 100.64.14.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.40 + 100.64.14.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.41 + 100.64.14.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.42 + 100.64.14.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.44 + 100.64.14.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.45 + 100.64.14.45 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.46 + 100.64.14.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.47 + 100.64.14.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.49 + 100.64.14.49 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.50 + 100.64.14.50 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.51 + 100.64.14.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.52 + 100.64.14.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921330 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 415f4d70-fa17-11ed-a491-43a9a8789c21 + + + diff --git a/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8da3a4666c6fa59d843179d3cc87515642d99f19 --- /dev/null +++ b/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.129 + 100.64.58.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 417267d0-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6eac856346b5f4a57b6eb7d1b10fa3238bdcd53a --- /dev/null +++ b/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.99 + 100.64.34.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332761 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41727e30-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aed9ea2921e50afce813c6c36f4d6d798ea281ea --- /dev/null +++ b/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613257 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41794140-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfba52f11191256de564e9deb1e3034e1033802c --- /dev/null +++ b/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.129 + 100.64.58.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 418098a0-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b21789ea314e5e753d157e28573e89b1e9540f0 --- /dev/null +++ b/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.99 + 100.64.34.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41814b40-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a8dbc651564d5719660ebacb603631182c80bfd --- /dev/null +++ b/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.233 + 100.64.69.233 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713663681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4184e7f0-ff80-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4184e7f0-ff80-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88da9874633862af76a8d66d466292b8a219e4fe --- /dev/null +++ b/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.55 + 100.64.8.55 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713663681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4185f960-ff80-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4185f960-ff80-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa81285e9b70908f06e94c434445a4659a934687 --- /dev/null +++ b/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613257 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41874b00-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6b31c3649e40affb795cdfab5c9c711a3139f05 --- /dev/null +++ b/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461977 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 41881070-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e25dff7a5600fd3bd08b08aaa87362842aa98c8e --- /dev/null +++ b/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.19 + 100.64.2.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41896e10-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95b4ef4844071e5bd54109e2fb2d4750df10b38c --- /dev/null +++ b/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332761 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 418f2df0-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21c0543378663a4cdb9e8d197f2f1ed37f3e24d9 --- /dev/null +++ b/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml @@ -0,0 +1,683 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.70 + 100.64.14.70 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.71 + 100.64.14.71 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.72 + 100.64.14.72 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.73 + 100.64.14.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.205 + 100.64.9.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.74 + 100.64.14.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.75 + 100.64.14.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.76 + 100.64.14.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.77 + 100.64.14.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.78 + 100.64.14.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.79 + 100.64.14.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.80 + 100.64.14.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.81 + 100.64.14.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.249 + 100.64.5.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.82 + 100.64.14.82 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41946730-fa17-11ed-a491-43a9a8789c21 + + + diff --git a/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3558fdc2cbc3a2ddaa061cca983469fdd033eb4 --- /dev/null +++ b/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.10 + 100.64.12.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167308 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41972250-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f450e98fd4e28f536985de15116a9c540087435 --- /dev/null +++ b/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702952892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4197ca80-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4197ca80-9e16-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16995784d8ccd1ffd3f19b3ae4e528ca1b0f4089 --- /dev/null +++ b/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.19 + 100.64.2.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971325 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41981410-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..450a2d5f9b083d484cdd130c08e26a2e07bc77a1 --- /dev/null +++ b/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.33 + 100.64.82.33 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4198d780-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4198d780-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..847defd6e6dbe2c5b6de0d3b3168e54134eb4d06 --- /dev/null +++ b/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695332761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 419e4920-58c8-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3cbeeacd8ab4910aaf1eb8cb8b5289dbf724787 --- /dev/null +++ b/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.151 + 100.64.26.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.152 + 100.64.26.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701941857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41a23d70-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41a23d70-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41a23d70-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41a23d70-94e4-11ee-b216-b792b1d50feb + + + diff --git a/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c4b7eadf77a6b606f6d43716ca4736037d29dd5 --- /dev/null +++ b/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.10 + 100.64.12.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167308 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 41a35750-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..603ac87f5ca2c4fdb9c017dc53e47b33db98ef1d --- /dev/null +++ b/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.209 + 100.64.97.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41b63860-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9569f2d0789edf46e43e2adbf6916751d6df9bd4 --- /dev/null +++ b/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.212 + 100.64.97.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41b9e1e0-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f5c0a0b45335036a55c4b373e34e526d48a5332 --- /dev/null +++ b/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167308 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41bde430-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10eddfc510b88062bfa37b955b8d0e26c3e2c596 --- /dev/null +++ b/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.97.212 + 100.64.97.212 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41c0bfb0-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da2ce4212599bbd35d33fe4863ed101f91b300ff --- /dev/null +++ b/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.218 + 100.64.97.218 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41c41b10-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cd3cc8c4c2b80af2c1cfbd59bf748c512be6f8e --- /dev/null +++ b/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.218 + 100.64.97.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41c860d0-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1844e136517b873e86da3c509579202cc68341f --- /dev/null +++ b/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.217 + 100.64.20.217 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.214 + 100.64.72.214 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94051cf0ffd3671fbb4897d2efed9d4813a539f1 --- /dev/null +++ b/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.143 + 100.64.20.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 41cb1ff0-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd4a4441441aaef49062d6be7216c363508f8a17 --- /dev/null +++ b/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.20.143 + 100.64.20.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41d18890-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27f9a7fc8adc04f5b0a0e0f624542f6098c024af --- /dev/null +++ b/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.134 + 100.64.64.134 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 41dcce80-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34a0d71efe9bb3e33330a21a890923a8df7777f9 --- /dev/null +++ b/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699167308 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 41e03940-7ba8-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d444d7994d59c57e0dff69aa1f6582b25ab63e3 --- /dev/null +++ b/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.230 + 100.64.80.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41e984d0-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41e984d0-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd920db8fe5f273eb94484a1bf910f6c0c86df71 --- /dev/null +++ b/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.254 + 100.64.39.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.190 + 100.64.36.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.25 + 100.64.3.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.255 + 100.64.39.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.138 + 100.64.12.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.1 + 100.64.40.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.1 + 100.64.40.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.2 + 100.64.40.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.3 + 100.64.40.3 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.4 + 100.64.40.4 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.5 + 100.64.40.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.6 + 100.64.40.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.7 + 100.64.40.7 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.8 + 100.64.40.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.9 + 100.64.40.9 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.10 + 100.64.40.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.78 + 100.64.14.78 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 41ea4180-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4975e5e02bb1d25c1d21113759a02c1d3f1e73a --- /dev/null +++ b/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.122 + 100.64.56.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744760 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42034d00-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e259507bad793dd3b49298405989e0e994b39dc9 --- /dev/null +++ b/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.23 + USER-0015-1326.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.24 + 100.64.40.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.243 + 100.64.20.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.25 + 100.64.40.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.26 + 100.64.40.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.27 + 100.64.40.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.28 + 100.64.40.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.29 + 100.64.40.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.30 + 100.64.40.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.224 + 100.64.13.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.31 + 100.64.40.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4204ce60-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d9caaf44a366861afed57ac1abb03cbb2117962 --- /dev/null +++ b/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42102360-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09b4559bdb45fe90c9e257b18c250f59e20daf00 --- /dev/null +++ b/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.122 + 100.64.56.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744760 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 421415e0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30a12f4000171eeeb0f2d1bf7db9211f42318183 --- /dev/null +++ b/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.124 + 100.64.56.124 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744760 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 42221fa0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95fe4dff5b53444b792e7d43c903911421fd5077 --- /dev/null +++ b/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.227 + 100.64.68.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710543388 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42255be0-e31f-11ee-acbf-dfdefbfef3c0 + + + diff --git a/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1485cf9dff543a174bd7207d41de4b87dd875141 --- /dev/null +++ b/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.162 + 100.64.3.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.73.217 + 100.64.73.217 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685893712 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 422def50-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893712 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 422def50-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f63334670afb9edbc9bfb66593da671a1de450b --- /dev/null +++ b/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.124 + 100.64.56.124 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744760 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 422f8d20-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a1e73cf402a6a40ab1302c8efaf81c922491fd7 --- /dev/null +++ b/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.186 + 100.64.92.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696783172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42333ba0-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e5a48417a2b2ff040ed222b8f559c6a7cc396b3 --- /dev/null +++ b/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42342620-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e055819ac7ecb9f54c046a60e69c6d1ef9b0975e --- /dev/null +++ b/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.175 + 100.64.53.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475189 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42385380-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85c5f200378796358d13f695ad6ed6d636dfab4c --- /dev/null +++ b/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.168 + 100.64.19.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 423b6940-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f66a0ad8cdd75c5ff133d0548fe02950b1dce75 --- /dev/null +++ b/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709026406 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 423c3d30-d553-11ee-9e46-fb4031711de5 + + + diff --git a/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ad3659b4b4164d1619ae11a7127324030575c39 --- /dev/null +++ b/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.135 + 100.64.52.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685893712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 423d7fb0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 423d7fb0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 423d7fb0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893712 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 423d7fb0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3a87c3f3b35acc30a4f7cfff0b558ad8e274d84 --- /dev/null +++ b/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.175 + 100.64.53.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475189 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 424a2dd0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c737b193f26f9a18b10008289d44195ee88ae806 --- /dev/null +++ b/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.34.37 + USER-0015-1761.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.161 + 100.64.77.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655377111 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 424c3ac0-ed63-11ec-9115-b3a5268a4818 + + + INCIDENT_LINK + 1655377111 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 424c3ac0-ed63-11ec-9115-b3a5268a4818 + + + diff --git a/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..778e045c14ee13385c6f427267a7fee9b50a9dd8 --- /dev/null +++ b/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.22 + 100.64.19.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4251e750-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9af39ed6db8de119bfa558e60c5f82fce0b8e27c --- /dev/null +++ b/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.66 + 100.64.37.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.158 + 100.64.15.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.57 + USER-0015-1203.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.8 + 100.64.23.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.168 + 100.64.6.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.67 + 100.64.37.67 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.68 + 100.64.37.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.69 + 100.64.37.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.242 + 100.64.11.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.70 + 100.64.37.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.71 + 100.64.37.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.72 + 100.64.37.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.73 + 100.64.37.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.74 + 100.64.37.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.75 + 100.64.37.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155941 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 425b5ba0-4e14-11ee-a329-837d93fb4fa8 + + + diff --git a/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f1590d0a203e64a6c37dd24a6af194ddebbd4a8 --- /dev/null +++ b/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.22 + 100.64.19.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 426a5150-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02ac1f464e900692f352e4742c1737625594fc57 --- /dev/null +++ b/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.84.239 + 100.64.84.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42793dd0-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86bfc9d1b3cf5d861aa31dccc5c0c59409b9935d --- /dev/null +++ b/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.222 + 100.64.29.222 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666302219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 427c03c0-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4557ca8e8a72423bee298453c02998006dc9fbe --- /dev/null +++ b/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.48 + 100.64.94.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 427d0e60-3b39-11ed-8f70-4f50899684e5 + + + INCIDENT_LINK + 1663935263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 427d0e60-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4c836bf9f57eef7142c0e72cefbcabc039eb129 --- /dev/null +++ b/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.29.222 + 100.64.29.222 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 427f8630-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89932698b249a0a264208dc24f71059b2675a833 --- /dev/null +++ b/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.48 + 100.64.94.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 42839e10-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e00b4aa1760723e1c28e3f78d104f5ca627f6c57 --- /dev/null +++ b/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.22 + 100.64.19.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 428a5c70-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e19cc162c6682648439fed2330376e8910be6b0d --- /dev/null +++ b/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.242 + 100.64.90.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 428c77b0-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4122ac7708d222fe55460069abcd1316b0717f8 --- /dev/null +++ b/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.153 + 100.64.31.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914246 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42903960-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0683ff01b59b47f7b7c8a6d5ed5d8801a26836ab --- /dev/null +++ b/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.73.112 + 100.64.73.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 42932e70-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml b/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e479cce4c066169401bf0113de7eb14cc40af592 --- /dev/null +++ b/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.4 + 100.64.18.4 + [] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.5 + 100.64.18.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.6 + 100.64.18.6 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.7 + 100.64.18.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.8 + 100.64.18.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.9 + 100.64.18.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.10 + 100.64.18.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + INCIDENT_LINK + 1684811811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f + + + diff --git a/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c63f271ce34981f8b650c947ecf2609f7f38da00 --- /dev/null +++ b/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4298bd20-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f82693c73f09bda524615bef68a990f6e62590b2 --- /dev/null +++ b/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.22 + 100.64.19.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42a66ff0-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1068d988a5a9aa5cea169736a586bdc3dbe2980c --- /dev/null +++ b/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42a88b30-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..540f4970da6497c588624d351d16a411520fd45e --- /dev/null +++ b/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663935263 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42af41f0-3b39-11ed-8f70-4f50899684e5 + + + diff --git a/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c367fe9c3bb682204011c09821d883b100fff3f5 --- /dev/null +++ b/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.155 + 100.64.68.155 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.156 + USER-0015-1508.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42b0be40-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42b0be40-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42b0be40-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42b0be40-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10afe7c27cdb7471bf06f563a15ac43eb218b3bf --- /dev/null +++ b/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.157 + 100.64.68.157 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42b15a80-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42b15a80-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..651248e4f6e6a8ba0eb51b3935fbd42ba35ece00 --- /dev/null +++ b/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42c569a0-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26cbf87e3e605492a10a9b0234be966cfc9d2cc6 --- /dev/null +++ b/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.220 + 100.64.15.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971327 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42c65ae0-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2238b69bcd97d78b040e7182794d08be6c9a9594 --- /dev/null +++ b/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.3 + 100.64.39.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971328 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42df3a10-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85b7409e192f91ca06635600fc4750f08b7d7d2f --- /dev/null +++ b/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.22.206 + 10.113.22.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"] + + + HOST + 100.64.70.12 + 100.64.70.12 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.13 + 100.64.70.13 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.14 + 100.64.70.14 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42dfd090-eb96-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..463d7fc6bc7a14c2969afe586c752ca10c1fc6e4 --- /dev/null +++ b/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.101 + 100.64.58.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42e47940-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dbcfaf99f393c2f7ce1c886fb4620a87fb29f64 --- /dev/null +++ b/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.226 + 100.64.46.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709026407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 42eaccb0-d553-11ee-9e46-fb4031711de5 + + + diff --git a/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5338a2d695198b1a8ea996a51b74c8daa56b43fc --- /dev/null +++ b/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.39 + 100.64.77.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689001981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42ebe3a0-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 42ebe3a0-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9496e5239259cc44ea2b2d8dca72fde3cca4e54 --- /dev/null +++ b/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.3 + 100.64.39.3 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971328 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42ed1cc0-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5002b24a0e674fc011d8c28cb9f8775683fc65b5 --- /dev/null +++ b/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.101 + 100.64.58.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179135 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 42fb3590-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b0df665537f2eb14a313caa20fd3898e467f8af --- /dev/null +++ b/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.226 + 100.64.46.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709026407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 42fb6e80-d553-11ee-9e46-fb4031711de5 + + + diff --git a/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b743a25c5600168be56b734159ebf1291cea0b9 --- /dev/null +++ b/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689001981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 430781f0-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 430781f0-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87ba8b139252b21869d284392e327bfe4ba33e63 --- /dev/null +++ b/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.58 + 100.64.80.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324395 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43087000-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324395 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43087000-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad41e06479462eb7469b491fd656d9333f56b870 --- /dev/null +++ b/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.48 + 100.64.80.48 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b453bc613e165ff17a843106e8ff101dbfc156c --- /dev/null +++ b/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.252 + 100.64.41.252 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.253 + 100.64.41.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.254 + 100.64.41.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.255 + 100.64.41.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.1 + 100.64.42.1 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.1 + 100.64.42.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.2 + 100.64.42.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.3 + 100.64.42.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.4 + 100.64.42.4 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.5 + 100.64.42.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.6 + 100.64.42.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.7 + 100.64.42.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.8 + 100.64.42.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.9 + 100.64.42.9 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.10 + 100.64.42.10 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.253 + 100.64.18.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789117 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ae290-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f30665d78f12613ed703bc6300cbe57f6a20a525 --- /dev/null +++ b/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.33 + HOST-15454 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.55.36 + 100.64.55.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687130235 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ffdb0-0e2e-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130235 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 430ffdb0-0e2e-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..040dbcbd7a75817e46ced0d711e7d1e7bd3b91e8 --- /dev/null +++ b/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.124.113.55 + 10.124.113.55 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.249.219 + 172.27.249.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.246.119 + 172.16.246.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412068 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 431637a0-33c8-11ef-bc42-75e180de3d4b + + + INCIDENT_LINK + 1719412068 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 431637a0-33c8-11ef-bc42-75e180de3d4b + + + INCIDENT_LINK + 1719412068 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 431637a0-33c8-11ef-bc42-75e180de3d4b + + + INCIDENT_LINK + 1719412068 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 431637a0-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce6888f1c03f9424d18112891de58983ed2d9ebc --- /dev/null +++ b/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.195.227 + 172.21.195.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.94.57 + 100.64.94.57 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.168 + 100.64.86.168 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664674857 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43232af0-41f3-11ed-a891-2d9e83e3a063 + + + INCIDENT_LINK + 1664674857 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43232af0-41f3-11ed-a891-2d9e83e3a063 + + + INCIDENT_LINK + 1664674857 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43232af0-41f3-11ed-a891-2d9e83e3a063 + + + INCIDENT_LINK + 1664674857 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43232af0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d984597fc92831ffca526d85b33cf211af9c826c --- /dev/null +++ b/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.41 + 100.64.40.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.42 + 100.64.40.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.43 + 100.64.40.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.246 + 100.64.19.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.44 + 100.64.40.44 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.45 + 100.64.40.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.46 + 100.64.40.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.218 + 100.64.30.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.104 + 100.64.15.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.224 + 100.64.17.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.47 + 100.64.40.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.48 + 100.64.40.48 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.203 + 100.64.12.203 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.49 + 100.64.40.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.50 + 100.64.40.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.142 + 100.64.28.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.219 + 100.64.35.219 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704015 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43275560-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41a1cf28dcb16d6a1defc6755571008b2c4c983b --- /dev/null +++ b/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689903925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 432b7e70-2768-11ee-b240-577a40e6eef6 + + + diff --git a/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75097e30cc4c8c30909ae0359657f90714d4601f --- /dev/null +++ b/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.167 + 100.64.20.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 432defb0-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba6c5b1001b58b0ddc71d8c9de209d8b92837e3f --- /dev/null +++ b/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,815 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.45 + 100.64.47.45 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.62 + 100.64.26.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.217 + 100.64.31.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.177 + 100.64.53.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.178 + 100.64.53.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.179 + 100.64.53.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.23 + 100.64.28.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.202 + 100.64.12.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.180 + 100.64.53.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.181 + 100.64.53.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.104 + 100.64.32.104 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.182 + 100.64.53.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.228 + 100.64.6.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475190 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43337c60-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7acab01e5f660c8e7a57ddfb7f4a479fe6155812 --- /dev/null +++ b/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.167 + 100.64.20.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 433dce30-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d522a03596f6ff7cb9f581e0a78b61be2026c7ef --- /dev/null +++ b/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.45 + 100.64.47.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475190 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43450890-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..522f77cd544e67437611f485b4018ee91e2b882f --- /dev/null +++ b/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.180 + 100.64.5.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200250 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43472870-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89a0311492625bfe0c92c9197c0f69e34cb75b02 --- /dev/null +++ b/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.180 + 100.64.5.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200250 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4355ce70-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4e9a6f794583999013c30d1b7a9afee89e5b4c8 --- /dev/null +++ b/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.50 + 100.64.82.50 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690760771 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4355d440-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760771 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4355d440-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760771 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4355d440-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760771 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4355d440-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..077df14b3563f3a4022df415b246dfa52cae8f81 --- /dev/null +++ b/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.135 + 100.64.94.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678402003 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4357d970-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6cc62f2987cbe90372e9d68ccde00497186a54e --- /dev/null +++ b/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.135 + 100.64.94.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402003 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 435b82f0-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18ea45c8d2a433b8371c2c34678ae9a3b4f5d44e --- /dev/null +++ b/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402003 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 43612840-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..158a2b4a79f1ab2be692d8d4c2c61423d1494a97 --- /dev/null +++ b/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131136 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4365b520-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb7b9c7292a9b66cf6f00261ce112ccf79e05fa3 --- /dev/null +++ b/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131136 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4374f760-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e9d4b8cdc4dc8239fff4bca6d443fd48a89d267 --- /dev/null +++ b/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.207 + 100.64.18.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43863930-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae0d252a21a1e7f6ea4ea2650a2cc4fc308899ab --- /dev/null +++ b/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.191 + 100.64.10.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 438d48a0-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..289eec3d2674391e2348918810a4d962ad756f49 --- /dev/null +++ b/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml @@ -0,0 +1,62 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + CRED + CRED-0012 + ["Suspicious User"] + 0.625 + ["Windows Logs"] + + + HOST + 100.64.83.238 + HOST-16825 + ["Exploiting Host"] + 0.71875 + ["Precinct"] + + + INCIDENT_LINK + 1676906925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host"] + complete-mission + Unprocessed + 4394d830-b133-11ed-8c7d-65e7f37a4d8d + + + diff --git a/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a28d00b6d12435f290573d94684f1e8e4e61f59 --- /dev/null +++ b/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.207 + 100.64.18.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469642 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43952d50-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..555f14c9d2dc1623fe219fb511553f3a9073f7b9 --- /dev/null +++ b/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.191 + 100.64.10.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 439c15b0-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1e08c78149dcabe529e7f9b348f0f53bfa643c0 --- /dev/null +++ b/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.5 + 100.64.39.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43a40bd0-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45951ff8e50068192ed3e5120d70fca039bc3adf --- /dev/null +++ b/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.235 + 100.64.31.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43b18cf0-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d36bb64bd72f6db1aa85bc07ac71498cfec290fc --- /dev/null +++ b/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.7 + 100.64.39.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43b4d4b0-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6d1045cbf5b1f07528a832e5b4d7c3ee4d2049e --- /dev/null +++ b/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.35 + 100.64.43.35 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.50 + 100.64.69.50 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.51 + 100.64.69.51 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105131 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43b7a710-56b6-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4dc571c7473888f817e0ef458991a8105a874dd8 --- /dev/null +++ b/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.32 + USER-0015-1856.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.86 + 100.64.76.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43b98460-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43b98460-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..922088f73361a307def617dd7065af968ee1295e --- /dev/null +++ b/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.33 + USER-0015-1857.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43c36f70-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..548c3a2b7e04643a7afd996a56e013d04d759bea --- /dev/null +++ b/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.7 + 100.64.39.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43c57680-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8b7ea133d66bab155759d031e1982cebd506675 --- /dev/null +++ b/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.213 + 100.64.23.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429270 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml new file mode 100644 index 0000000000000000000000000000000000000000..652c31194f74c844e48023768e02014413eb62e4 --- /dev/null +++ b/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.54 + USER-0015-1420.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.90 + 100.64.57.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43cd7160-0938-11ee-a886-17db84346526 + + + diff --git a/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..941b594c318badf81291061342a6305f50ba6540 --- /dev/null +++ b/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.33 + USER-0015-1857.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 43cfa470-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe5f07a72de7398885641f7435346412c5ced00a --- /dev/null +++ b/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.249.2 + 172.17.249.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.91.130 + 100.64.91.130 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43d98fc0-589f-11ee-a130-b3fc4de2b604 + + + INCIDENT_LINK + 1695315155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43d98fc0-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c342c22af6ca4590e735af2bb4c3b5439523683b --- /dev/null +++ b/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,675 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.191 + 100.64.53.191 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.105 + 100.64.28.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.192 + 100.64.53.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.193 + 100.64.53.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.9 + 100.64.22.9 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.194 + 100.64.53.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.195 + 100.64.53.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.253 + 100.64.14.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.196 + 100.64.53.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.197 + 100.64.53.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.187 + 100.64.44.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.198 + 100.64.53.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.162 + 100.64.35.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.251 + 100.64.13.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.61 + 100.64.50.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475191 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 43e14890-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95efecc0fa0d1f2a45eb876080b5f5f80cb9d656 --- /dev/null +++ b/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.65 + 100.64.31.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43e17180-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4dfba3046a55bd6e698af9207f787edb0be0ba55 --- /dev/null +++ b/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.116 + 100.64.8.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 43f1c350-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3863861f0022d45e09c74e114d81f287f44a4f8 --- /dev/null +++ b/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.65 + 100.64.31.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 43f2d6a0-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..965584c419b833f3aca83b4f22c19dca87c116ee --- /dev/null +++ b/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.142 + 100.64.71.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670201623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43f7a5c0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43f7a5c0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43f7a5c0-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43f7a5c0-7437-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a58c4adea32d16ada9d5dbd380f0985cc9ba1aa3 --- /dev/null +++ b/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.181 + 100.64.34.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710490134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43ff8570-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 43ff8570-e2a3-11ee-8bca-5190faa7db82 + + + diff --git a/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47825887b2bc780b75ab6d44d48f8fe06414f56b --- /dev/null +++ b/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.116 + 100.64.8.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475192 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4401c8e0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8170be40ea0ffc30135027fdb01d18b42bcc820 --- /dev/null +++ b/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475192 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44166250-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1177c88a7a8a89c3489fa79595c60e234569af0c --- /dev/null +++ b/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.166 + 100.64.36.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 441718f0-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..673ed5a972b1c9373a07e853a43a8dd3d9347dc2 --- /dev/null +++ b/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.166 + 100.64.36.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4427bac0-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88e7fa4585506330b6e170ac768df0123895acaa --- /dev/null +++ b/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475192 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 442de1f0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaf133dd5c7b99384816734f3fa2ff3e1aadf72e --- /dev/null +++ b/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.245 + 100.64.60.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4430a340-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4580ae16a75bf9725e5b445074f3942e6dccbd95 --- /dev/null +++ b/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.122 + 100.64.28.122 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971330 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44341bb0-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb3389206fe130ec77140340d9bafa068c9deb1c --- /dev/null +++ b/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44377230-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24563e49c9c549e25a506f43e525f0db346016e7 --- /dev/null +++ b/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.245 + 100.64.60.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360683 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4442a4a0-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c345082398466b43c930c1af88a8cf78bcfe131 --- /dev/null +++ b/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.9 + 100.64.39.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 444b9670-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af14e28b4ec6609981aaa6c3cf63bd84e80ae08b --- /dev/null +++ b/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.57 + 100.64.52.57 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1711474111 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 444c58e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474111 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 444c58e0-eb96-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5df310bb3d1d2cc7f0295b99212da4a21c623b76 --- /dev/null +++ b/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.9 + 100.64.39.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 445affc0-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f0a3b06f5a053a6a4e5bc7a3b189b488b874669 --- /dev/null +++ b/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.131 + 100.64.42.131 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.68.227 + 100.64.68.227 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.68 + 100.64.69.68 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335384 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4461f680-ea53-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a814a372f44b8cb828d9a5f43fe560c20c1777f --- /dev/null +++ b/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.40 + 100.64.77.40 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44656440-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18c86b0dbc7d1d124b7b8cafc9f4b16b4787f279 --- /dev/null +++ b/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.104 + 100.64.34.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 446a4200-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e15c16f21ae876b3da178e99cd3a3f83190365cc --- /dev/null +++ b/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.237 + 100.64.31.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827123 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 446b6710-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3aafeadbf4d6a36609de62ef192cc13203a3b5f --- /dev/null +++ b/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.208 + 100.64.66.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412070 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 446e74a0-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9526f581c275dfbd18485a000a99c06300c45df4 --- /dev/null +++ b/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.207 + 100.64.67.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4474d140-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5f9db17861517985c5f523dd6f151304f12dcce --- /dev/null +++ b/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.104 + 100.64.34.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697947542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4476ec30-7090-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e1d7fe5d962a1955ebb1b7547364709344023d1 --- /dev/null +++ b/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.49 + 100.64.22.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 447c1850-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81c2b981746abf9da0191be9e3205bc3fa52c8c9 --- /dev/null +++ b/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.208 + 100.64.66.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412070 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 447c5750-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..210e7ab9ce5aeac090be12bbb8e91bc81ee1270e --- /dev/null +++ b/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.237 + 100.64.31.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827123 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 448334d0-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..393f2ac72496f877aec9cc0d7c3134cb1b5fa280 --- /dev/null +++ b/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.32 + 100.64.55.32 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613262 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 448ce9e0-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a078e92d140f91e30a23eb25b4d0b81806f34d3 --- /dev/null +++ b/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml @@ -0,0 +1,705 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.127 + 100.64.35.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.31 + 100.64.4.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.89 + 100.64.37.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.90 + 100.64.37.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.91 + 100.64.37.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.92 + 100.64.37.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.93 + 100.64.37.93 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.94 + 100.64.37.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.95 + 100.64.37.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.96 + 100.64.37.96 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.97 + 100.64.37.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.68 + 100.64.30.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.98 + 100.64.37.98 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.53 + 100.64.37.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + INCIDENT_LINK + 1694155945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 448dcc00-4e14-11ee-a329-837d93fb4fa8 + + + diff --git a/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..861b27103026b21e875a6f49af721e415d6ca778 --- /dev/null +++ b/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.49 + 100.64.22.49 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087392 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44921150-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fb5db7f928bf95bec8c3a0d3074cdc88e66d4f1 --- /dev/null +++ b/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml @@ -0,0 +1,799 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.196 + 100.64.5.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.183 + 100.64.30.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.174 + 100.64.11.174 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.182 + 100.64.55.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.183 + 100.64.55.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.184 + 100.64.55.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.185 + 100.64.55.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.31 + 100.64.25.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.77 + 100.64.27.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.186 + 100.64.55.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.187 + 100.64.55.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.188 + 100.64.55.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.194 + 100.64.26.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.190 + 100.64.55.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.191 + 100.64.55.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.192 + 100.64.55.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546918 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 449d4bb0-488a-11ee-bc66-374cad92392b + + + diff --git a/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..709581a2096a4b186960f8597c6823aafdf4b080 --- /dev/null +++ b/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.139 + 100.64.52.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435949 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44a26660-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9283055eacc82638daa37f43c6024e491dd34c24 --- /dev/null +++ b/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.218 + 100.64.52.218 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 44a4c820-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f5e56e085f27c5cf4ff784fa0651187117b2305 --- /dev/null +++ b/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.249 + USER-0015-1295.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087392 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44a76e10-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1f887b84fd586e17384acfcb163273ff0dc816a --- /dev/null +++ b/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.160.55 + USER-0015-1988.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.77 + 100.64.87.77 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44b137f0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44b137f0-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ba103672cd749aa44631e425bad052fb470807c --- /dev/null +++ b/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml @@ -0,0 +1,895 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.98 + 100.64.14.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.99 + 100.64.14.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.100 + 100.64.14.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.101 + 100.64.14.101 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.102 + 100.64.14.102 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.103 + 100.64.14.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.104 + 100.64.14.104 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.30 + 100.64.8.30 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.106 + 100.64.14.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.107 + 100.64.14.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.108 + 100.64.14.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.109 + 100.64.14.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + INCIDENT_LINK + 1684921336 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44b99c00-fa17-11ed-a491-43a9a8789c21 + + + diff --git a/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ead8ec2dadd615c8871ea23edd545abe9f72c0a --- /dev/null +++ b/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.141 + 100.64.52.141 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435949 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44bb6ca0-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0d8d8fda5c423cbde7fa230c7ee6987645fd39e --- /dev/null +++ b/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.226.235 + 172.31.226.235 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.240 + 100.64.87.240 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661969031 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44cc32c0-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969031 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44cc32c0-2957-11ed-833a-955cfd42297d + + + diff --git a/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6aea3ced72a3add515c3ff251d941cb42ea4699 --- /dev/null +++ b/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.143 + 100.64.52.143 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435949 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44d0a250-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a5d9cc59c87fcb34a6b6109404eed1e1c4736c0 --- /dev/null +++ b/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.122 + 100.64.24.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131138 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44da2cb0-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4535b2076b22cdb6f935028ea307a878fe10250 --- /dev/null +++ b/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.131 + 100.64.58.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431454 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 44e56e80-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2751da4f77a9806fdb45ed2c51a6d0ab1e3c6ae6 --- /dev/null +++ b/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.166 + 100.64.40.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 44ef4de0-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b3ff7c91c4150982718703b74327abb9fe13fba --- /dev/null +++ b/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.58 + 100.64.94.58 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1664674860 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 44fea1b0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea3c9b537bbf9c9f8667643ba56ca8804a12f0d7 --- /dev/null +++ b/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.58 + 100.64.94.58 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664674860 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4507f080-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4734b1eea966c95bda013be97509b338b683f96a --- /dev/null +++ b/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4509dac0-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21b20a22f8a33b002108bcac6c2e405edecd955d --- /dev/null +++ b/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.60 + 100.64.94.60 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664674860 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 450ad6b0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b8170791dd6277d242eaa48b09ef0662041afa9 --- /dev/null +++ b/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4519b940-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9901e63db257be53d48b3144b28b32e509cb4e02 --- /dev/null +++ b/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.132 + 100.64.68.132 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + INCIDENT_LINK + 1694394316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 451e00e0-503f-11ee-b697-c3310c70b120 + + + diff --git a/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d8b734837a44674f7af95f80eb30080fadcaa09 --- /dev/null +++ b/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,817 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.101 + 100.64.34.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.124 + 100.64.12.124 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.102 + 100.64.34.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.195 + 100.64.19.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.103 + 100.64.34.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.104 + 100.64.34.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.105 + 100.64.34.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.107 + USER-0015-1301.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.108 + 100.64.34.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.109 + 100.64.34.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.110 + 100.64.34.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.111 + 100.64.34.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.112 + 100.64.34.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.113 + 100.64.34.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.21 + 100.64.15.21 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943379 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 451ee460-676e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53a16d3aac0e86324725e99a84521c4e293443d8 --- /dev/null +++ b/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.70.207 + 100.64.70.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717561 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 45286f20-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1c5088bf3f2a793aa6483f87c4c49ee3ba6ed89 --- /dev/null +++ b/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.42 + 100.64.9.42 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200253 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 452a8e70-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ad4e9d2eb055647952c0855214147be856e3b49 --- /dev/null +++ b/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.30.91 + 100.64.30.91 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552170 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4538efd0-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9aa1d42864a69d0aa88373a4718fdb9ac1fa6c73 --- /dev/null +++ b/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.46 + 100.64.9.46 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200253 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45445800-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31e74727951fa3650d18850d6d2f770e862454b1 --- /dev/null +++ b/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695595619 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 456268f0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595619 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 456268f0-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad970fb33fb696f9ea25cd8f72ee1745175d23a2 --- /dev/null +++ b/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.25 + 100.64.63.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874958 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4565c4d0-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..366e77989530e554e1487126ed115da26149b508 --- /dev/null +++ b/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,723 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.247 + 100.64.60.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.31 + 100.64.28.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.248 + 100.64.60.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.190 + 100.64.20.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.156 + 100.64.48.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.249 + 100.64.60.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.250 + 100.64.60.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.251 + 100.64.60.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.252 + 100.64.60.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.253 + 100.64.60.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.1 + 100.64.42.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.254 + 100.64.60.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.255 + 100.64.60.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.1 + 100.64.61.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45670060-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e959175bd5dd106c7f5d4a0ebb24ec762f66692c --- /dev/null +++ b/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.163 + 100.64.57.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 456883d0-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f24c7c25641a504012c6ac5a8fc8646e3b737c83 --- /dev/null +++ b/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.25 + 100.64.63.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874958 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4573f5a0-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8642be6bfced5d9d17bd819fe82ecf61efb048f9 --- /dev/null +++ b/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.163 + 100.64.57.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432708 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4577ed20-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3a957cd6cbdb2fb06c037d66c29dba31829fdbf --- /dev/null +++ b/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874958 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45813c10-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8305e115aee5bfd598c22b7552fc4b1c2221f37 --- /dev/null +++ b/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.247 + 100.64.60.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 45813f20-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2aae69112323e063fa499d49cc57f6d603da236 --- /dev/null +++ b/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.204 + 100.64.55.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.205 + 100.64.55.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.114 + 100.64.37.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.206 + 100.64.55.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.1 + 100.64.42.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.207 + 100.64.55.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.208 + 100.64.55.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.192 + 100.64.21.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.194 + 100.64.26.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.224 + 100.64.27.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.209 + 100.64.55.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.40 + 100.64.39.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.191 + 100.64.55.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.93 + 100.64.33.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.52 + 100.64.51.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.210 + 100.64.55.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.211 + 100.64.55.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.212 + 100.64.55.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.213 + 100.64.55.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + INCIDENT_LINK + 1693546920 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4583db20-488a-11ee-bc66-374cad92392b + + + diff --git a/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2099bbf37d4cb2b487f1f8431422a8f94dcd9bd8 --- /dev/null +++ b/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.67 + 100.64.33.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.226 + 100.64.82.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687776202 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 458b0360-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776202 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 458b0360-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776202 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 458b0360-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776202 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 458b0360-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91f0498715f417283620e6f7f6e00c9190737d77 --- /dev/null +++ b/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874959 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 458ea990-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aba1a3bed93e12f6fb16b40bea28b8f69a73fa9b --- /dev/null +++ b/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.132 + 100.64.91.132 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 45b77780-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b6551ba0e78f09cb69049e62c3c4aaaa2efd3d2 --- /dev/null +++ b/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,287 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.73 + 100.64.26.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.155 + 100.64.31.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.156 + 100.64.31.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.157 + 100.64.31.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.120 + 100.64.25.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.60 + 100.64.13.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.158 + 100.64.31.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + INCIDENT_LINK + 1715914251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45be47d0-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2f3d428e3a73c934cb99be973363ce156147f02 --- /dev/null +++ b/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.204 + USER-0015-1338.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491481 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45c07d90-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..195a87a2716f11cf5825030fb170d2c965101f73 --- /dev/null +++ b/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45c55210-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d951ab6c2ae2ab346183f244a76134d7ec19865e --- /dev/null +++ b/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.158 + 100.64.68.158 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699836900 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45c8fac0-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836900 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45c8fac0-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836900 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45c8fac0-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836900 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45c8fac0-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cd30329b8a7348541ff79c78b699b49449a970f --- /dev/null +++ b/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.110 + 100.64.2.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.17 + 100.64.77.17 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704199 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45d52780-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bc7b01d1377c8f79bc8ae57a8beda5ca22db4e9 --- /dev/null +++ b/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.210 + 100.64.66.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45d6b730-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5579030d1573c0e2bd6f48a1e3a7bad3f5b69681 --- /dev/null +++ b/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.204 + USER-0015-1338.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 45d760f0-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3096142d372852f5b3bb4b214c1d2ca9692e919e --- /dev/null +++ b/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179140 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 45d7a190-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..408bdd5f0b8dc5336558926444b4bd8da80e23e2 --- /dev/null +++ b/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.244 + 100.64.3.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45d8a460-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51cf1e8f9101ff55072c74656babdc861c28316e --- /dev/null +++ b/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.34 + 100.64.82.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.32 + USER-0015-1913.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.35 + 100.64.82.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.36 + 100.64.82.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.37 + 100.64.82.37 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.38 + 100.64.82.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.39 + 100.64.82.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.40 + 100.64.82.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.41 + 100.64.82.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8f230-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bc9ebaf66105b40c7d8f03b38b4997f60649bbb --- /dev/null +++ b/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.163 + 100.64.31.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45d8fbc0-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22007f6919b32dda9a86d9f7490db0b447d601dd --- /dev/null +++ b/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.163 + 100.64.31.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 45e69050-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1634b5b053463f413f33cf4c479ef2feaa453e23 --- /dev/null +++ b/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.244 + 100.64.3.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429273 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2024555089ba8e07b8c8f9af5bf7c028b04f57c6 --- /dev/null +++ b/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.165 + 100.64.57.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45eca7f0-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86feb4d88da0fceffa71f3e09deeca2489131933 --- /dev/null +++ b/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.95 + 100.64.69.95 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1695200054 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45f16100-5793-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200054 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45f16100-5793-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17fabeb3c03485dc62465d4879813cd7121c4bd4 --- /dev/null +++ b/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.165 + 100.64.57.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 45fb26e0-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6925314061e96f069402aa60c6ed513545de0c8 --- /dev/null +++ b/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686951139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45fb4040-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 45fb4040-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd0b0a866be221ffbd2c2df1c8f5d29beb278799 --- /dev/null +++ b/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.144.11.175 + 10.144.11.175 + ["Exploiting Host"] + 0.68359375 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + HOST + 100.64.70.17 + USER-0015-1541.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.18 + 100.64.70.18 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.19 + 100.64.70.19 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.20 + 100.64.70.20 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.21 + 100.64.70.21 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474114 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ee26be89f0bc742ff429256ee2f766c4204f15f --- /dev/null +++ b/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 460b2da0-93b7-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c4f309f5b3bbb5aae399cecd82815e344c2309c --- /dev/null +++ b/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,811 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.220 + 100.64.79.220 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.221 + 100.64.79.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.54.169 + 100.64.54.169 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.222 + 100.64.79.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.223 + 100.64.79.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.224 + 100.64.79.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.79.225 + 100.64.79.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.226 + 100.64.79.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.25 + 100.64.77.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.40 + 100.64.1.40 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.227 + 100.64.79.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.228 + 100.64.79.228 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704200 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 460cb240-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b7c4652efcd6d809f8041fecf04c65a21464539 --- /dev/null +++ b/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.133 + 100.64.46.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4610b2f0-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5df47f2210a5cc203c82782931374c7a1e9ce0bb --- /dev/null +++ b/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.239 + 100.64.31.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4611c410-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26eed206701f4d215e5830f15fc8d2ae823087ad --- /dev/null +++ b/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.201 + 100.64.12.201 + ["Exploiting Host"] + 0.83125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.29 + 100.64.74.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316426 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46129fd0-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46129fd0-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46129fd0-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316426 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46129fd0-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d24dae740b9ebf175c1f7d4ba8be4499d59ca9d0 --- /dev/null +++ b/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.174 + 100.64.89.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.178.215.78 + 10.178.215.78 + ["Exploiting Target"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1688500764 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 461ebe50-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500764 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 461ebe50-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdf66e4e10cf3a01bdf9f8ec9444da69aa1f7dca --- /dev/null +++ b/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.133 + 100.64.46.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 461f8000-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc1f8358fdb7826e7645e7643c3e69b6b8ba8986 --- /dev/null +++ b/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.145 + 100.64.52.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704435952 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 462ed2c0-ab93-11ee-be9c-dfff52fc589e + + + diff --git a/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a348948e86c32e24ee76ce3737eb05f20b5dcdbe --- /dev/null +++ b/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.62 + 100.64.40.62 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.63 + 100.64.40.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.220 + 100.64.31.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.28 + 100.64.2.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.109 + 100.64.34.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.64 + 100.64.40.64 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.65 + 100.64.40.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.66 + 100.64.40.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.67 + 100.64.40.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.68 + 100.64.40.68 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.69 + 100.64.40.69 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.93 + 100.64.35.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.70 + 100.64.40.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704020 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46344740-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f12483d434bccb2ffd59e2f7fa3677cfbd6742d --- /dev/null +++ b/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.48 + 100.64.9.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200255 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 463dfa40-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..136ceffcdb71832b60991f5daccfd706e099862d --- /dev/null +++ b/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.42 + 100.64.82.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46428970-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46428970-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46428970-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46428970-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63fcc707dc500e608492b71269df3a7fe210255a --- /dev/null +++ b/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.34 + 100.64.55.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613265 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 464d5e90-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5c378921e35b9b78b599457e5c02234472a38b7 --- /dev/null +++ b/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.36.99 + 100.64.36.99 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.80 + 100.64.69.80 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.81 + 100.64.69.81 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812586 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 465bbea0-93b7-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f5e9c830c3a1dfb3b7ab8efc5bddb0e5f175469 --- /dev/null +++ b/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.20.216 + 100.64.20.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 465c97d0-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1efa7be211ad5ebe0aac9d6da5aff0144ebaf514 --- /dev/null +++ b/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.184 + 100.64.87.184 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 465f08d0-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2c1949a83546029c70d8f0913defd4e578aaa99 --- /dev/null +++ b/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.142 + 100.64.19.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 465f4730-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b42c72c7e34e7232d58f2ea9175c57c5313704db --- /dev/null +++ b/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.184 + 100.64.87.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46628b40-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57ae38c646ad98840d82a8883d7319e9737a8e49 --- /dev/null +++ b/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.158 + 100.64.44.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4664d530-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e44c8c811ba6d088b90a47a5f08b379240268f43 --- /dev/null +++ b/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.44.158 + 100.64.44.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 466a0550-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e400b62a96181f6f895c328c2ac7c11676b851ed --- /dev/null +++ b/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 466d60b0-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3885a657399e40c0eeed055d99ef512c073af06d --- /dev/null +++ b/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46717f60-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3aeec0ac66d951d0638952d31b52b55ff729d4a --- /dev/null +++ b/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.167 + 100.64.20.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613265 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46738430-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d24bba456a7af5fce322585bad616115eada825c --- /dev/null +++ b/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.142 + 100.64.19.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4675dc70-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a8283a13f5dc03785f29da0219b2d4eac5a9a5a --- /dev/null +++ b/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.167 + 100.64.33.167 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1693247133 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46854fc0-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247133 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46854fc0-45d0-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c34ba1057b7725f54804e39f717de065a92803e --- /dev/null +++ b/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.167 + 100.64.20.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698613265 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 468a1970-769e-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b4917661113833b498617099c5b169d5ebab89d --- /dev/null +++ b/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.28.63.204 + USER-0015-2061.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.155 + 100.64.95.155 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720719462 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 468b8c10-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719462 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 468b8c10-3fac-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cf5913b9184491caa774c0bb7982df22871b67d --- /dev/null +++ b/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,389 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.70.208 + 100.64.70.208 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.4.233 + 100.64.4.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.32.174 + 100.64.32.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.53.192 + 100.64.53.192 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.13.94 + 100.64.13.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.76 + 100.64.18.76 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5688fcb186270bf4c0ce8dfbe3cd0eb60a71c40 --- /dev/null +++ b/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 469370d0-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b02c857c36f8e586510ba8a1699366bf4099e116 --- /dev/null +++ b/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4696a2c0-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d3ced1613b04575e8e5f6f36b6d17c55b042291 --- /dev/null +++ b/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.24 + 100.64.42.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.25 + 100.64.42.25 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.26 + 100.64.42.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.27 + 100.64.42.27 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46973da0-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c77a0f0de42873cb6c220030209c0abd1095c7c --- /dev/null +++ b/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704201 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 469d5980-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd6820931a804f31f24a500bbe52b3d92a03a758 --- /dev/null +++ b/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.209 + 100.64.67.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799237 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46a3bf30-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..975ddd6f7d74c81f024ed0c8d1b279ca5d7d0c6f --- /dev/null +++ b/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.209 + 100.64.78.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704201 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46a45e60-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af457d9ccff717997bd399d1e23a64c76a28f14f --- /dev/null +++ b/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.209 + 100.64.78.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704201 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46aa2ac0-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b42e3b6179e2da5cdec06bf5319189b6c3b98db3 --- /dev/null +++ b/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.65 + 100.64.38.65 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46afe7f0-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b187495d57a23c9cc1a80ca30277af9c1136173 --- /dev/null +++ b/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.209 + 100.64.67.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799238 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46b4d630-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..365b783e5a92c72d592abdf0686004e6df611e1b --- /dev/null +++ b/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.38.65 + 100.64.38.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46b5b450-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2ca1f89cc62a6ae06e6cc8918494061d3d025f7 --- /dev/null +++ b/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.240 + 100.64.40.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469647 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 46b5f550-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa31ce13b8c695fc43ceeaee1dd8ebd2fde3240a --- /dev/null +++ b/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.167 + 100.64.81.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662685434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46ba4830-2fdb-11ed-ad03-71de3cb0a14b + + + diff --git a/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a8b694f457c7afac8a1907ac7a8b5e68762ed77 --- /dev/null +++ b/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.131 + 100.64.34.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.122 + 100.64.28.122 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.132 + USER-0015-1302.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.133 + 100.64.34.133 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.1 + 100.64.32.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.208 + 100.64.8.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.134 + 100.64.34.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.135 + 100.64.34.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.136 + 100.64.34.136 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.137 + 100.64.34.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.146 + 100.64.30.146 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.25 + 100.64.32.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.138 + 100.64.34.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.31 + 100.64.28.31 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.41 + 100.64.11.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.139 + 100.64.34.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.140 + 100.64.34.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943382 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46c23420-676e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ccf64d73d21da6daf73a6b81d5e526e0f02eb83 --- /dev/null +++ b/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.162 + 100.64.65.162 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473970 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46c3fe50-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb18afed16f180d7ec5bb494d440f7d5cab6bc70 --- /dev/null +++ b/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469647 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46c7cfa0-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1295f65e492757c9ba1478c4aa7fdd08d28398d4 --- /dev/null +++ b/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.229 + 100.64.79.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1663704201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46d92a00-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46d92a00-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46d92a00-391f-11ed-b85e-918b65550ba2 + + + INCIDENT_LINK + 1663704201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 46d92a00-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..292276a6a2f75e4793d773cb0c8bf7088d8bd45f --- /dev/null +++ b/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469648 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 46dcb730-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5de0e4203580efe4dfb61caaee2b913cc223c6a9 --- /dev/null +++ b/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.156 + 100.64.38.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406809 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46e56a40-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..655906551f94e5d878f12481aa807103fbecc53b --- /dev/null +++ b/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.164 + 100.64.10.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702427626 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46e939e0-994f-11ee-8477-4312413938e1 + + + diff --git a/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57282ee9aeb7d3908289435d7083fa27ec2d0fe5 --- /dev/null +++ b/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.158 + 100.64.38.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406810 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 46fdad30-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..854819ae0de79aa20fd2c6432dce6db99af29c60 --- /dev/null +++ b/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 470a06c0-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3694d3d1142157f0bc1f135a2a7d040780765e8 --- /dev/null +++ b/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.159 + 100.64.88.159 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688199688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 470e8710-17e8-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11e01bd7fc0f74c83c1269309602aaf464efe0c3 --- /dev/null +++ b/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.188 + USER-0015-1353.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338714 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47165330-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad8e921e2de16b622030bb52fcf3e14cd8c1db77 --- /dev/null +++ b/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.159 + 100.64.88.159 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688199688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 472199e0-17e8-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61c117442e5730434edee9ba695b099332fb36fc --- /dev/null +++ b/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827128 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47257e00-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..322ad819dd0c5c88a1f5a5e545fd24af3c166ad4 --- /dev/null +++ b/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4729e040-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..900451e50059a741cdaeeb941c308a09c80370cd --- /dev/null +++ b/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.135 + 100.64.58.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431458 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47379be0-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6770e7fbfddc32ce1e858b79ccacee6cbca0ae11 --- /dev/null +++ b/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.177 + 100.64.69.177 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1684848755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4741b240-f96e-11ed-abbc-bf3a0fdc2e0e + + + diff --git a/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f23e6065999e05810b4109001ed2d0a614b0f09 --- /dev/null +++ b/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.135 + 100.64.58.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431458 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4744e250-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..441f77e6a09425922e8502f48ce14584cf5730e1 --- /dev/null +++ b/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.155 + 100.64.26.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.126 + 100.64.25.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.156 + 100.64.26.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.157 + 100.64.26.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.50 + 100.64.18.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.158 + 100.64.26.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.159 + 100.64.26.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.236 + 100.64.19.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4757ba10-94e4-11ee-b216-b792b1d50feb + + + diff --git a/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c8ff4f141f20f414db24e1e378e9235895ab4b8 --- /dev/null +++ b/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.148 + 100.64.48.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157342 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 475922b0-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..223e6cac455b229a52229377971050dbb6f23ff0 --- /dev/null +++ b/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 475d1280-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34c389980735962e71a409d5a3ff5ddf7fd767ab --- /dev/null +++ b/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.148 + 100.64.48.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157342 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4767a1a0-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..224bc11a94ff390207123e78eb1835ae5fdaadd5 --- /dev/null +++ b/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.230 + 100.64.79.230 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47682390-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8eadf827feafbee4a538b8f86fecc4d5f0362a57 --- /dev/null +++ b/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.59.91 + 172.30.59.91 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.89.227 + 100.64.89.227 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718132175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 476a7eb0-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 476a7eb0-2824-11ef-b581-4d62d2263ef1 + + + diff --git a/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd9db70e043a9a48bd236b768f6d296f3e432b0e --- /dev/null +++ b/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 476bb880-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4aef75654e173a45b7cca2a198c0a7e04673ce6 --- /dev/null +++ b/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.230 + 100.64.79.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663704202 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 476da1d0-391f-11ed-b85e-918b65550ba2 + + + diff --git a/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ab571cbb1d348ba452c751c9a35a719c457e628 --- /dev/null +++ b/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.216 + 100.64.42.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491484 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4781dca0-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1bda88b1935bb6a097932df279cff9c1c7c906c --- /dev/null +++ b/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml @@ -0,0 +1,817 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.248 + 100.64.69.248 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.250 + 100.64.69.250 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.251 + 100.64.69.251 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.69.252 + 100.64.69.252 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698889004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4782e8a0-7920-11ee-91ac-9dbe9218e297 + + + diff --git a/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdcc18f8fef1752001ea99db4d123a7a3c5c0dcc --- /dev/null +++ b/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47835f30-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acf650ee8eb7f43534ea9a4cd51de0c78b85d2c0 --- /dev/null +++ b/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.96 + 100.64.69.96 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695200056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 478aecc0-5793-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 478aecc0-5793-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4eecea67e947d730a0e929c4e74e9b41a1ce6c07 --- /dev/null +++ b/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 479364c0-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f98dea189200880198807bb27bcad14aa11b999 --- /dev/null +++ b/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.216 + 100.64.42.216 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4798e710-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06553e2eeb41ff617ea6693f461148542c1b8dcc --- /dev/null +++ b/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47a258e0-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a34daee918bd6831bfd99e3edd225a6281a1acf --- /dev/null +++ b/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.105 + 100.64.68.105 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1698056639 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47ab08b0-718e-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698056639 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47ab08b0-718e-11ee-9fe3-bf96143a208f + + + diff --git a/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cb0283f621c79735e402b2c8cd8f26c5e96f0dd --- /dev/null +++ b/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.67 + 100.64.49.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.64.82 + 100.64.64.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.200 + 100.64.14.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.248 + USER-0015-1221.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.199 + 100.64.97.199 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.169 + USER-0015-2178.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.200 + 100.64.97.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.94 + 100.64.51.94 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.97.201 + 100.64.97.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.163 + 100.64.88.163 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.74 + 100.64.95.74 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.51 + 100.64.23.51 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636931 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ae5160-085a-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddfc6c88a246be9c5254c109634722d18828758e --- /dev/null +++ b/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.119.135.83 + 10.119.135.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.0.149 + 100.64.0.149 + ["Exploiting Target"] + 0.8734375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.0.61 + 100.64.0.61 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716457568 + malicious + 0.8734375 + 0.8734375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457568 + malicious + 0.8734375 + 0.8734375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457568 + malicious + 0.8734375 + 0.8734375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457568 + malicious + 0.8734375 + 0.8734375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e11fde42bf2561ef59f6898da75b630f0ca0ada0 --- /dev/null +++ b/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.116 + 100.64.30.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47b7d430-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7cff2fe34ce6a9066006eb9a7a2f224a15b2fc3 --- /dev/null +++ b/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47b7dcb0-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3952f2a4e838c2f8d2a27ca2fb12b3d13051f2b1 --- /dev/null +++ b/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.196 + 100.64.15.196 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.44 + 100.64.65.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.45 + 100.64.65.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.14 + 100.64.57.14 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.198 + 100.64.47.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.46 + 100.64.65.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.52 + 100.64.29.52 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.134 + 100.64.12.134 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.72 + 100.64.39.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.131 + 100.64.58.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.47 + 100.64.65.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.48 + 100.64.65.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.70 + 100.64.14.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.57 + 100.64.28.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + INCIDENT_LINK + 1699235178 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47ba4a10-7c46-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db8a45adab4437279c660f4cd941ad2104d98553 --- /dev/null +++ b/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.186 + 100.64.75.186 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572555 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47c04040-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f780aa46d6dd655c9a1a942bdc423a59fb019f5 --- /dev/null +++ b/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.45.252 + 100.64.45.252 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1684848756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e + + + diff --git a/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..615dc493ebafeab68568a45fcc2f982857da4894 --- /dev/null +++ b/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.186 + 100.64.75.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1681572555 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47c410d0-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..515f9d13ab8b04bfa157881a3ea7396030a73e59 --- /dev/null +++ b/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.103 + 100.64.58.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179143 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47c4cb90-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e586cfd5164e50124b4540f5cf526e54c61535c1 --- /dev/null +++ b/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.8 + 100.64.76.8 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572555 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47c65ac0-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f59b7e9359fd6628fb99602a556367e1fb60b126 --- /dev/null +++ b/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.96 + 100.64.64.96 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671679 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47c6af50-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..734ef6b59b410a85e593486d5d15b904b75c9442 --- /dev/null +++ b/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.196 + 100.64.15.196 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699235178 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47c9b360-7c46-11ee-b44e-cd55abd836ec + + + diff --git a/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..954200f203ee00fc0b0fd2588313248453869ea5 --- /dev/null +++ b/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.76.8 + 100.64.76.8 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572555 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47ca0440-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b0a9b54067a61581e32bfc2bf75d681dc99e7ac --- /dev/null +++ b/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1684848756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e + + + diff --git a/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8405c7697e5c519c97f017976c898b9724709f06 --- /dev/null +++ b/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47cc9d30-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c21991c5620427f073dddf4616ac5582910e1fb3 --- /dev/null +++ b/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.96 + 100.64.64.96 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671679 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47d4e020-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39a1f5ad04e0f66139a89c8aefcac9fa1995feee --- /dev/null +++ b/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.116 + 100.64.30.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47d52030-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6a4fc898bb3adfb1c4187a4bd6da60ab69fa148 --- /dev/null +++ b/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.53 + 100.64.33.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376157 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47d98ee0-cf69-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a3f61db93f0f7298975a827ca0c19958583ba72 --- /dev/null +++ b/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47dbdf70-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc9b8fa0923481cf0a4f6b7449dd204bb5531ef3 --- /dev/null +++ b/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.103 + 100.64.58.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179143 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47dcc060-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b21feba6d00261ac297fe78dc4906c11aa133d0a --- /dev/null +++ b/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.20 + 100.64.41.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47e12b60-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f1912c1d84c2902b8bc028b7bededb5cb4b97e4 --- /dev/null +++ b/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.98 + 100.64.64.98 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671679 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47e3d440-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95818e1da98672d9386293171f237193b7c2472b --- /dev/null +++ b/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.165 + 100.64.31.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47e5bbb0-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4392d2cde2dab4cf11d727ad7b64369bcaba6f66 --- /dev/null +++ b/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.12 + 100.64.83.12 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + 100.64.1.159 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.13 + 100.64.83.13 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013932 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47e80120-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013932 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47e80120-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013932 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47e80120-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013932 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47e80120-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4338c909221b4956890e75fc968f89469606f95 --- /dev/null +++ b/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.53 + 100.64.33.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47e96d60-cf69-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3bf93725c79f51af499983e0779ab5669d87cd03 --- /dev/null +++ b/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.247 + 100.64.60.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360689 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47eaec20-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3937ecece1b1d0b1b819545009b3d243191d6ea6 --- /dev/null +++ b/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47eb48c0-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d26c5556b6dd7e3834f7a5b40ea7a68dedc8905a --- /dev/null +++ b/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.74 + 100.64.30.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.182 + 100.64.16.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.75 + 100.64.30.75 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47f37c10-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d172b43fac965b04d187d914fa8b4b9f00b8421 --- /dev/null +++ b/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.18 + 100.64.26.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694179143 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47f3cad0-4e4a-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37e8964e4e6a4e4c5c5feb971af1972a13712a2d --- /dev/null +++ b/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.168 + 100.64.42.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 47f5eea0-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f71f33b0dd33992a54aaeed7e1b61e177648490 --- /dev/null +++ b/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.165 + 100.64.31.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914255 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 47f6aba0-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c24427ab1d902b027e6123caa484d9ef7a02c00 --- /dev/null +++ b/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.202 + 100.64.46.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697305450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 47fa3ce0-6ab9-11ee-a026-19c00241440b + + + diff --git a/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f953469b0003cff7b105ed34c9eea7fe30ad79d --- /dev/null +++ b/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.2 + 100.64.83.2 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136969 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 47fd43c0-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..273cb050a14a136e244ed2fba01078421f595a2a --- /dev/null +++ b/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.207 + 100.64.68.207 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1711615422 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48025a80-ecdf-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711615422 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48025a80-ecdf-11ee-ac0b-e5fde63aeb72 + + + diff --git a/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31fc5d12c559f8b54bca82f0ed299a23dc9a92e8 --- /dev/null +++ b/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671679 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48036a30-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff85c78579bb8eed900e99a3c1b4527c6ef42d48 --- /dev/null +++ b/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.32 + 100.64.78.32 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + USER-0015-1750.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667786140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48039ba0-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48039ba0-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24f9689a264ec7d5ef57d7625581806b8945fcde --- /dev/null +++ b/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.34 + 100.64.78.34 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.78.35 + 100.64.78.35 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1667786140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48054950-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48054950-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f1755072cfb60c43ae64f7cacfd521a3e44cfe2 --- /dev/null +++ b/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.78 + 100.64.30.78 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.79 + 100.64.30.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 480afbb0-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8da04d8dc5eeb3648dea98de830b2921c7917ac1 --- /dev/null +++ b/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.133 + 100.64.47.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692717566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 480c0710-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 480c0710-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 480c0710-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd3a877b6b9cf029b07150c855e65bed5d70348a --- /dev/null +++ b/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.76 + 100.64.62.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.230 + 100.64.72.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 480eda40-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 480eda40-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7303fd3d0d9477282b71a1f07b3b2bb614bf946 --- /dev/null +++ b/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671679 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4810d7b0-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b3c773d76d9eb149f2943d3a753973afa8d9dde --- /dev/null +++ b/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690805876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4810faa0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4810faa0-2f9c-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a98281ad52796c1ca9ada7fd9fc8db0a9f112b9d --- /dev/null +++ b/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.168 + 100.64.42.168 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48153670-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9ae7e8f753fe3016aff2ef5203b7eb8dfcc668c --- /dev/null +++ b/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.47.133 + 100.64.47.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4815f220-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6502787531681fa813f3215f1adba189e40b6562 --- /dev/null +++ b/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.200 + 100.64.72.200 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.59.195 + 100.64.59.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.51.208 + 100.64.51.208 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686591654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48184730-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48184730-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48184730-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48184730-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5b07ad1cba6acb7ec79ab45137b18d316d30759 --- /dev/null +++ b/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,951 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.151 + 100.64.34.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.152 + 100.64.34.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.153 + 100.64.34.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.78 + 100.64.8.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.154 + 100.64.34.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.155 + 100.64.34.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.156 + 100.64.34.156 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.157 + 100.64.34.157 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.60 + 100.64.12.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.158 + 100.64.34.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.159 + 100.64.34.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.160 + 100.64.34.160 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943384 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 481986c0-676e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d3621f9c49ab755dccab690200a157989b0e227 --- /dev/null +++ b/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.20 + 100.64.41.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685077678 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4819a080-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a150e23b42c06432288f29cc87190e3cd6fb4b31 --- /dev/null +++ b/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.82 + 100.64.30.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.51 + 100.64.18.51 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.249 + 100.64.10.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.83 + 100.64.30.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.84 + 100.64.30.84 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.85 + 100.64.30.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.135 + 100.64.23.135 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.86 + 100.64.30.86 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.87 + 100.64.30.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.88 + 100.64.30.88 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.89 + 100.64.30.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.90 + 100.64.30.90 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.91 + 100.64.30.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.92 + 100.64.30.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699458 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48207f80-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5c2c7008573d0b5a765ed396297fce9a1a0ccdb --- /dev/null +++ b/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.195 + 100.64.58.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 482b2f70-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a959b705877b2b63f056cbe27ead3771279ae7b0 --- /dev/null +++ b/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.144 + 100.64.71.144 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.53 + 100.64.1.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.145 + 100.64.71.145 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1670201630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 482d8740-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 482d8740-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 482d8740-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 482d8740-7437-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0790856bedd0ef5590acbf395dc9d6ed87539303 --- /dev/null +++ b/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.195 + 100.64.58.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473973 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 484a9e50-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5d3df4f596133ca0c834ae4cd491f80f2e9b4f2 --- /dev/null +++ b/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.21 + 100.64.33.21 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.32 + 100.64.42.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.33 + 100.64.42.33 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.34 + 100.64.42.34 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.35 + 100.64.42.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.36 + 100.64.42.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.239 + 100.64.37.239 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789126 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4852d050-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80288c7c3db8df155068c608129907875a2ef5e5 --- /dev/null +++ b/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.180 + 100.64.94.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677526267 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 486066c0-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..668ea48092ca7f054a6d3f7b8a77e9b539c4a2c3 --- /dev/null +++ b/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.195 + USER-0015-1324.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714251674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4863d050-04d9-11ef-9f37-4184b1db151c + + + diff --git a/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..585dd9e86520657d3a436b54c6bf205834a03717 --- /dev/null +++ b/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.167 + 100.64.31.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715914256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4877c280-13f8-11ef-b4e0-63669a8fd788 + + + diff --git a/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb6da768632bb2657c2d2cb77b93ac2de1537dc7 --- /dev/null +++ b/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.195 + USER-0015-1324.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714251674 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 487adac0-04d9-11ef-9f37-4184b1db151c + + + diff --git a/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..806ef469d425f2b7e1c4eb7f0596fb250694c32f --- /dev/null +++ b/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.200 + 100.64.27.200 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.192 + 100.64.70.192 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159858 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159858 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159858 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159858 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffa3c7b331c0632bc39a61beba3edee2e1e4817f --- /dev/null +++ b/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.194 + 100.64.70.194 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.49.89 + 100.64.49.89 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.70.193 + 100.64.70.193 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.28.98 + 100.64.28.98 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.195 + 100.64.70.195 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.38.150 + 100.64.38.150 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.70.196 + 100.64.70.196 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.197 + 100.64.70.197 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.31.242 + 100.64.31.242 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48971cd0-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc54198f324a88c6b31ca9a192dfe8f56e1a0a8a --- /dev/null +++ b/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,249 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.198 + 100.64.70.198 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.199 + 100.64.70.199 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.41.78 + USER-0015-1522.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.200 + 100.64.70.200 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4897b910-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66de1c22d2869f78c40817331e2cc3ba3dc41ea4 --- /dev/null +++ b/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.201 + 100.64.70.201 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.70.202 + 100.64.70.202 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48985550-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48985550-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48985550-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129233 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 48985550-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc54572eff39259c82f247a619dc7d718673593d --- /dev/null +++ b/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.38.17 + USER-0015-1933.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687776207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48b4a500-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48b4a500-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48b4a500-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48b4a500-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8991ba060dec31981f7f3f5f9a02f3b5ba9c8e8 --- /dev/null +++ b/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.212 + 100.64.9.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429278 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48ca9430-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..803771737d9ace82df277acdf20fe57c60e4b04c --- /dev/null +++ b/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.229 + 100.64.57.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.227 + 100.64.82.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776208 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48cdf960-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776208 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48cdf960-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dccd47dfc4eea6f9e7bac44253b885002c216cea --- /dev/null +++ b/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.134 + 100.64.91.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689357615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 48dcde60-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..431c0642eda0a897734cdd6aa36f228548ad135e --- /dev/null +++ b/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48eacac0-850d-11ee-89b4-37c02fa13bd9 + + +