f15hb0wn commited on
Commit
3678250
·
verified ·
1 Parent(s): ef31248

Upload per-incident GraphML sharded batch 15/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
  2. graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
  3. graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml +63 -0
  4. graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml +401 -0
  5. graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
  6. graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
  7. graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml +113 -0
  8. graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
  9. graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
  10. graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml +185 -0
  11. graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml +113 -0
  12. graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
  13. graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml +149 -0
  14. graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml +77 -0
  15. graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
  16. graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
  17. graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
  18. graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
  19. graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml +229 -0
  20. graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml +63 -0
  21. graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml +453 -0
  22. graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
  23. graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml +113 -0
  24. graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  25. graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml +401 -0
  26. graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml +77 -0
  27. graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml +63 -0
  28. graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml +63 -0
  29. graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
  30. graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml +85 -0
  31. graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml +63 -0
  32. graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml +113 -0
  33. graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml +63 -0
  34. graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  35. graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml +387 -0
  36. graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  37. graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
  38. graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml +107 -0
  39. graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  40. graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml +63 -0
  41. graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
  42. graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml +63 -0
  43. graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  44. graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml +221 -0
  45. graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml +63 -0
  46. graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
  47. graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml +63 -0
  48. graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml +77 -0
  49. graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml +185 -0
  50. graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml +63 -0
graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ad4a5330-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.168</data>
43
+ <data key="n_hostname">100.64.19.168</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-4424">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352808</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8b7bff80-6b27-11ee-bff6-eb2f5319dd87</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0da097e2-32b2-11ee-a1fb-4f54f91a66cd">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.224</data>
35
+ <data key="n_hostname">100.64.17.224</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0da097e2-32b2-11ee-a1fb-4f54f91a66cd" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699094847</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8b893be0-7aff-11ee-a7a4-7da27d63d8ce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5d22cb81-2bae-11ef-a950-4769d5827564">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="11ee3605-2919-11ef-95d6-394fbc009d95">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.51.72</data>
43
+ <data key="n_hostname">USER-0015-2121.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17021" target="HOST-18660">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1720457585</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8b8e2e80-3d4a-11ef-b144-c9d8335db792</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml ADDED
@@ -0,0 +1,401 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b15c67a2-164d-11ee-bd1e-998fe709eb0f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.77.192</data>
35
+ <data key="n_hostname">100.64.77.192</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="a0c95611-0625-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.103</data>
43
+ <data key="n_hostname">100.64.72.103</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="a54ad4a3-0627-11ee-98c4-03fbbffc96a5">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.72.72</data>
51
+ <data key="n_hostname">100.64.72.72</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="a3d64a22-0634-11ee-9292-037474792a78">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.11.123</data>
59
+ <data key="n_hostname">100.64.11.123</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <node id="8fe532a0-0635-11ee-a150-c9b826c4d475">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.60.227</data>
67
+ <data key="n_hostname">100.64.60.227</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="b180f2d3-0637-11ee-a699-19fd706a4513">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.12.47</data>
75
+ <data key="n_hostname">100.64.12.47</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
79
+ </node>
80
+ <node id="51882a70-062c-11ee-a961-f3aa8f0c341a">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.72.196</data>
83
+ <data key="n_hostname">100.64.72.196</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.7890625</data>
86
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
87
+ </node>
88
+ <node id="26e5fcd0-0649-11ee-b879-8fa356303378">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.6.6</data>
91
+ <data key="n_hostname">100.64.6.6</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="ef569e61-0647-11ee-97f2-25a892db4607">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.32.52</data>
99
+ <data key="n_hostname">USER-0015-1764.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="505cd130-0629-11ee-9082-893f136cddbf">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.14.18</data>
107
+ <data key="n_hostname">100.64.14.18</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.7890625</data>
110
+ <data key="n_products">["Precinct","Meraki"]</data>
111
+ </node>
112
+ <node id="cac95f30-0627-11ee-8ffb-516c3122460e">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.7.113</data>
115
+ <data key="n_hostname">100.64.7.113</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.4375</data>
118
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
119
+ </node>
120
+ <edge id="e1" source="b15c67a2-164d-11ee-bd1e-998fe709eb0f" target="HOST-12898">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1688107462</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7890625</data>
125
+ <data key="e_suspicion_score">0.7890625</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-12898" target="b15c67a2-164d-11ee-bd1e-998fe709eb0f">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1688107462</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7890625</data>
139
+ <data key="e_suspicion_score">0.7890625</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
147
+ </edge>
148
+ <edge id="e3" source="HOST-14615" target="a3d64a22-0634-11ee-9292-037474792a78">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1688107462</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.7890625</data>
153
+ <data key="e_suspicion_score">0.7890625</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
161
+ </edge>
162
+ <edge id="e4" source="a3d64a22-0634-11ee-9292-037474792a78" target="HOST-14615">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1688107462</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.7890625</data>
167
+ <data key="e_suspicion_score">0.7890625</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
175
+ </edge>
176
+ <edge id="e5" source="8fe532a0-0635-11ee-a150-c9b826c4d475" target="HOST-14615">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1688107462</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.7890625</data>
181
+ <data key="e_suspicion_score">0.7890625</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-14615" target="8fe532a0-0635-11ee-a150-c9b826c4d475">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1688107462</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.7890625</data>
195
+ <data key="e_suspicion_score">0.7890625</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
203
+ </edge>
204
+ <edge id="e7" source="HOST-12898" target="a3d64a22-0634-11ee-9292-037474792a78">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1688107462</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.7890625</data>
209
+ <data key="e_suspicion_score">0.7890625</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
217
+ </edge>
218
+ <edge id="e8" source="a3d64a22-0634-11ee-9292-037474792a78" target="HOST-12898">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1688107462</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.7890625</data>
223
+ <data key="e_suspicion_score">0.7890625</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
231
+ </edge>
232
+ <edge id="e9" source="b180f2d3-0637-11ee-a699-19fd706a4513" target="HOST-12898">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1688107462</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.7890625</data>
237
+ <data key="e_suspicion_score">0.7890625</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-12898" target="b180f2d3-0637-11ee-a699-19fd706a4513">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1688107462</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.7890625</data>
251
+ <data key="e_suspicion_score">0.7890625</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
259
+ </edge>
260
+ <edge id="e11" source="b180f2d3-0637-11ee-a699-19fd706a4513" target="HOST-13065">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1688107462</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.7890625</data>
265
+ <data key="e_suspicion_score">0.7890625</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-13065" target="b180f2d3-0637-11ee-a699-19fd706a4513">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1688107462</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.7890625</data>
279
+ <data key="e_suspicion_score">0.7890625</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
287
+ </edge>
288
+ <edge id="e13" source="26e5fcd0-0649-11ee-b879-8fa356303378" target="HOST-13065">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1688107462</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.7890625</data>
293
+ <data key="e_suspicion_score">0.7890625</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-13065" target="26e5fcd0-0649-11ee-b879-8fa356303378">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1688107462</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.7890625</data>
307
+ <data key="e_suspicion_score">0.7890625</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
315
+ </edge>
316
+ <edge id="e15" source="ef569e61-0647-11ee-97f2-25a892db4607" target="HOST-12898">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1688107462</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.7890625</data>
321
+ <data key="e_suspicion_score">0.7890625</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-12898" target="ef569e61-0647-11ee-97f2-25a892db4607">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1688107462</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.7890625</data>
335
+ <data key="e_suspicion_score">0.7890625</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
343
+ </edge>
344
+ <edge id="e17" source="505cd130-0629-11ee-9082-893f136cddbf" target="HOST-12898">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1688107462</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.7890625</data>
349
+ <data key="e_suspicion_score">0.7890625</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
357
+ </edge>
358
+ <edge id="e18" source="HOST-12898" target="505cd130-0629-11ee-9082-893f136cddbf">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1688107462</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.7890625</data>
363
+ <data key="e_suspicion_score">0.7890625</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
371
+ </edge>
372
+ <edge id="e19" source="HOST-14252" target="HOST-13065">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1688107462</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.7890625</data>
377
+ <data key="e_suspicion_score">0.7890625</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
385
+ </edge>
386
+ <edge id="e20" source="HOST-13065" target="HOST-14252">
387
+ <data key="e_type">INCIDENT_LINK</data>
388
+ <data key="e_timestamp">1688107462</data>
389
+ <data key="e_label_binary">malicious</data>
390
+ <data key="e_label_confidence">0.7890625</data>
391
+ <data key="e_suspicion_score">0.7890625</data>
392
+ <data key="e_mo_name">Data Theft</data>
393
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
394
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
395
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
396
+ <data key="e_lifecycle_stage">complete-mission</data>
397
+ <data key="e_disposition">Disrupted</data>
398
+ <data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
399
+ </edge>
400
+ </graph>
401
+ </graphml>
graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0da097e2-32b2-11ee-a1fb-4f54f91a66cd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.224</data>
43
+ <data key="n_hostname">100.64.17.224</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-4177">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699094847</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8b98a530-7aff-11ee-a7a4-7da27d63d8ce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2de88e31-078e-11ee-a636-b3ac657d8f21">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.38.63</data>
35
+ <data key="n_hostname">100.64.38.63</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="2de88e31-078e-11ee-a636-b3ac657d8f21" target="HOST-2773">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352808</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8b98d650-6b27-11ee-bff6-eb2f5319dd87</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="868f3044-020f-11ee-9a6f-614d58ccafa0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.74.66</data>
35
+ <data key="n_hostname">100.64.74.66</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="de284403-9d87-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.41</data>
43
+ <data key="n_hostname">100.64.71.41</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="1901dec1-f97b-11ed-b4c9-cb1d93e9067a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.29.39</data>
51
+ <data key="n_hostname">100.64.29.39</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
55
+ </node>
56
+ <edge id="e1" source="868f3044-020f-11ee-9a6f-614d58ccafa0" target="de284403-9d87-11ed-98f8-cd6642d241c0">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1685797628</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
69
+ </edge>
70
+ <edge id="e2" source="de284403-9d87-11ed-98f8-cd6642d241c0" target="868f3044-020f-11ee-9a6f-614d58ccafa0">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1685797628</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-13046" target="de284403-9d87-11ed-98f8-cd6642d241c0">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1685797628</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
97
+ </edge>
98
+ <edge id="e4" source="de284403-9d87-11ed-98f8-cd6642d241c0" target="HOST-13046">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1685797628</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="672d3023-51b1-11ee-8a7d-ff18061dc4f4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.226</data>
35
+ <data key="n_hostname">100.64.17.226</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="672d3023-51b1-11ee-8a7d-ff18061dc4f4" target="HOST-2709">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699094847</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.117.12.163</data>
35
+ <data key="n_hostname">10.117.12.163</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2de88e31-078e-11ee-a636-b3ac657d8f21">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.38.63</data>
43
+ <data key="n_hostname">100.64.38.63</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2773" target="HOST-6969">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697352808</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8ba72e30-6b27-11ee-bff6-eb2f5319dd87</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7b14bf03-0633-11ee-a0c5-27e8caf8506a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.73.58</data>
35
+ <data key="n_hostname">100.64.73.58</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="82df7850-0639-11ee-9d16-b90ac473a2f2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.88</data>
43
+ <data key="n_hostname">100.64.12.88</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="ed690132-0631-11ee-be55-af682c51cd88">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.73.75</data>
51
+ <data key="n_hostname">100.64.73.75</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="eef540a0-1d55-11ee-b7a2-f1b82e743eba">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.77.43</data>
59
+ <data key="n_hostname">100.64.77.43</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="528721e0-0642-11ee-b879-8fa356303378">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.72.51</data>
67
+ <data key="n_hostname">100.64.72.51</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-13591" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1689002103</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
85
+ </edge>
86
+ <edge id="e2" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-13591">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1689002103</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
99
+ </edge>
100
+ <edge id="e3" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-13250">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1689002103</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-13250" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1689002103</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
127
+ </edge>
128
+ <edge id="e5" source="eef540a0-1d55-11ee-b7a2-f1b82e743eba" target="HOST-13591">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1689002103</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7</data>
133
+ <data key="e_suspicion_score">0.25</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Unprocessed</data>
140
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-13591" target="eef540a0-1d55-11ee-b7a2-f1b82e743eba">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1689002103</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7</data>
147
+ <data key="e_suspicion_score">0.25</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Unprocessed</data>
154
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
155
+ </edge>
156
+ <edge id="e7" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-14268">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1689002103</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.7</data>
161
+ <data key="e_suspicion_score">0.25</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Unprocessed</data>
168
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-14268" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1689002103</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.7</data>
175
+ <data key="e_suspicion_score">0.25</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Unprocessed</data>
182
+ <data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f864be42-0199-11ee-9d93-8fff534112a0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.74.67</data>
35
+ <data key="n_hostname">100.64.74.67</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.228</data>
43
+ <data key="n_hostname">USER-0015-1671.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Umbrella","Meraki","Cisco Meraki Firewall","Stealthwatch","Windows Active Directory"]</data>
47
+ </node>
48
+ <node id="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.74.68</data>
51
+ <data key="n_hostname">100.64.74.68</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
55
+ </node>
56
+ <edge id="e1" source="f864be42-0199-11ee-9d93-8fff534112a0" target="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1685797628</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
69
+ </edge>
70
+ <edge id="e2" source="9c3d10a2-a1df-11ed-b350-afafcd1b69a1" target="f864be42-0199-11ee-9d93-8fff534112a0">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1685797628</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
83
+ </edge>
84
+ <edge id="e3" source="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea" target="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1685797628</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
97
+ </edge>
98
+ <edge id="e4" source="9c3d10a2-a1df-11ed-b350-afafcd1b69a1" target="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1685797628</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c2195426-2d1f-11ee-ba9c-4f54325a287e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.20.102</data>
43
+ <data key="n_hostname">100.64.20.102</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-4517">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713787930</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8bd37340-00a1-11ef-b5c2-73222c3b09d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="16f1c170-ea92-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.214</data>
35
+ <data key="n_hostname">100.64.81.214</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e673a9a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.49</data>
43
+ <data key="n_hostname">USER-0015-1822.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.81.215</data>
51
+ <data key="n_hostname">100.64.81.215</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="dd611f50-ea91-11ec-abf7-619673fe2558">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.73.89</data>
59
+ <data key="n_hostname">100.64.73.89</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <edge id="e1" source="16f1c170-ea92-11ec-90c7-eff83c975df3" target="HOST-15260">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1656543747</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-15260" target="16f1c170-ea92-11ec-90c7-eff83c975df3">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1656543747</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
91
+ </edge>
92
+ <edge id="e3" source="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6" target="HOST-15260">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1656543747</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-15260" target="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1656543747</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.7</data>
111
+ <data key="e_suspicion_score">0.25</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Unprocessed</data>
118
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
119
+ </edge>
120
+ <edge id="e5" source="16f1c170-ea92-11ec-90c7-eff83c975df3" target="HOST-14764">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1656543747</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7</data>
125
+ <data key="e_suspicion_score">0.25</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Unprocessed</data>
132
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-14764" target="16f1c170-ea92-11ec-90c7-eff83c975df3">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1656543747</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7</data>
139
+ <data key="e_suspicion_score">0.25</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Unprocessed</data>
146
+ <data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.232.245</data>
35
+ <data key="n_hostname">192.168.232.245</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="50347f55-0642-11ee-a474-c1a66c71fe5c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.77.44</data>
43
+ <data key="n_hostname">100.64.77.44</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7" target="50347f55-0642-11ee-a474-c1a66c71fe5c">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689002104</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8bd8b660-1f34-11ee-bd83-b52c9cbf0232</data>
61
+ </edge>
62
+ <edge id="e2" source="50347f55-0642-11ee-a474-c1a66c71fe5c" target="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1689002104</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">8bd8b660-1f34-11ee-bd83-b52c9cbf0232</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="cdd42780-26e6-11ed-85c0-314d1b5c3437">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.95.111</data>
35
+ <data key="n_hostname">100.64.95.111</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e07bd5c8-1e37-11ed-af4e-c398b832a4a0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">100.64.84.55</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="cdd42780-26e6-11ed-85c0-314d1b5c3437" target="HOST-17027">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1666892900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8be8ad10-561f-11ed-90b9-dd5c5c82d817</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e07bd5c8-1e37-11ed-af4e-c398b832a4a0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">100.64.84.55</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="cdd42780-26e6-11ed-85c0-314d1b5c3437">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.111</data>
43
+ <data key="n_hostname">100.64.95.111</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17027" target="HOST-18796">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1666892900</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8bec5690-561f-11ed-90b9-dd5c5c82d817</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab33c381-f49a-11ec-acf0-6ba76852b533">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.55.52.223</data>
35
+ <data key="n_hostname">10.55.52.223</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="f1d261a1-4d5c-11ed-b58e-8b5e2baf72e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.113</data>
43
+ <data key="n_hostname">100.64.95.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16895" target="f1d261a1-4d5c-11ed-b58e-8b5e2baf72e4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1666892901</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8bf07540-561f-11ed-90b9-dd5c5c82d817</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.146</data>
35
+ <data key="n_hostname">100.64.17.146</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4143" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713787931</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml ADDED
@@ -0,0 +1,229 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7d1affa6-3df4-11ee-b5fb-0bfdba910d64">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.203</data>
35
+ <data key="n_hostname">100.64.23.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="be6bda84-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.22</data>
43
+ <data key="n_hostname">100.64.68.22</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="094cdc20-0626-11ee-9f36-61ae8743c399">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.68.14</data>
51
+ <data key="n_hostname">100.64.68.14</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
55
+ </node>
56
+ <node id="0027f7c6-0625-11ee-9290-9f7f8caf087f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.68.31</data>
59
+ <data key="n_hostname">100.64.68.31</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
63
+ </node>
64
+ <node id="7df26782-51b6-11ee-b4eb-e37aff9ad59e">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.11.153</data>
67
+ <data key="n_hostname">100.64.11.153</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
71
+ </node>
72
+ <node id="f7c3d5e7-0624-11ee-b0df-0ffd69bf48e8">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.18.249</data>
75
+ <data key="n_hostname">100.64.18.249</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
79
+ </node>
80
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.68.45</data>
83
+ <data key="n_hostname">100.64.68.45</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
87
+ </node>
88
+ <edge id="e1" source="HOST-11918" target="HOST-11392">
89
+ <data key="e_type">INCIDENT_LINK</data>
90
+ <data key="e_timestamp">1695745632</data>
91
+ <data key="e_label_binary">malicious</data>
92
+ <data key="e_label_confidence">0.7</data>
93
+ <data key="e_suspicion_score">0.25</data>
94
+ <data key="e_mo_name">Data Theft</data>
95
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
96
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
97
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
98
+ <data key="e_lifecycle_stage">complete-mission</data>
99
+ <data key="e_disposition">Unprocessed</data>
100
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
101
+ </edge>
102
+ <edge id="e2" source="HOST-11392" target="HOST-11918">
103
+ <data key="e_type">INCIDENT_LINK</data>
104
+ <data key="e_timestamp">1695745632</data>
105
+ <data key="e_label_binary">malicious</data>
106
+ <data key="e_label_confidence">0.7</data>
107
+ <data key="e_suspicion_score">0.25</data>
108
+ <data key="e_mo_name">Data Theft</data>
109
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
110
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
111
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
112
+ <data key="e_lifecycle_stage">complete-mission</data>
113
+ <data key="e_disposition">Unprocessed</data>
114
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
115
+ </edge>
116
+ <edge id="e3" source="HOST-11918" target="HOST-11377">
117
+ <data key="e_type">INCIDENT_LINK</data>
118
+ <data key="e_timestamp">1695745632</data>
119
+ <data key="e_label_binary">malicious</data>
120
+ <data key="e_label_confidence">0.7</data>
121
+ <data key="e_suspicion_score">0.25</data>
122
+ <data key="e_mo_name">Data Theft</data>
123
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
124
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
125
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
126
+ <data key="e_lifecycle_stage">complete-mission</data>
127
+ <data key="e_disposition">Unprocessed</data>
128
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
129
+ </edge>
130
+ <edge id="e4" source="HOST-11377" target="HOST-11918">
131
+ <data key="e_type">INCIDENT_LINK</data>
132
+ <data key="e_timestamp">1695745632</data>
133
+ <data key="e_label_binary">malicious</data>
134
+ <data key="e_label_confidence">0.7</data>
135
+ <data key="e_suspicion_score">0.25</data>
136
+ <data key="e_mo_name">Data Theft</data>
137
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
138
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
139
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
140
+ <data key="e_lifecycle_stage">complete-mission</data>
141
+ <data key="e_disposition">Unprocessed</data>
142
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
143
+ </edge>
144
+ <edge id="e5" source="HOST-11918" target="HOST-11404">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1695745632</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.7</data>
149
+ <data key="e_suspicion_score">0.25</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Unprocessed</data>
156
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
157
+ </edge>
158
+ <edge id="e6" source="HOST-11404" target="HOST-11918">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1695745632</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.7</data>
163
+ <data key="e_suspicion_score">0.25</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Unprocessed</data>
170
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
171
+ </edge>
172
+ <edge id="e7" source="7df26782-51b6-11ee-b4eb-e37aff9ad59e" target="HOST-11377">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1695745632</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.7</data>
177
+ <data key="e_suspicion_score">0.25</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Unprocessed</data>
184
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
185
+ </edge>
186
+ <edge id="e8" source="HOST-11377" target="7df26782-51b6-11ee-b4eb-e37aff9ad59e">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1695745632</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.7</data>
191
+ <data key="e_suspicion_score">0.25</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Unprocessed</data>
198
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
199
+ </edge>
200
+ <edge id="e9" source="HOST-11932" target="HOST-11424">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1695745632</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.7</data>
205
+ <data key="e_suspicion_score">0.25</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Unprocessed</data>
212
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
213
+ </edge>
214
+ <edge id="e10" source="HOST-11424" target="HOST-11932">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1695745632</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.7</data>
219
+ <data key="e_suspicion_score">0.25</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Unprocessed</data>
226
+ <data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
227
+ </edge>
228
+ </graph>
229
+ </graphml>
graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="89cbc042-0b68-11ee-a07a-cfa6a9a5db76">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.184</data>
43
+ <data key="n_hostname">100.64.17.184</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-4164">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697862192</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c0d8530-6fc9-11ee-9ae8-5ba4cc946389</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml ADDED
@@ -0,0 +1,453 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.33.209</data>
35
+ <data key="n_hostname">100.64.33.209</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ef81652-c823-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="2ab35972-facd-11ed-af2b-e36b5e3a502a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.52.54</data>
51
+ <data key="n_hostname">100.64.52.54</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b64ce795-c822-11ed-93e7-73b4f1774f3f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.24.191.229</data>
59
+ <data key="n_hostname">172.24.191.229</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="0276e3f5-c823-11ed-b38f-718276329dbf">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.30.201.119</data>
67
+ <data key="n_hostname">172.30.201.119</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
71
+ </node>
72
+ <node id="72089dc1-c8b0-11ed-9030-3fa9190e58fd">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.7.51</data>
75
+ <data key="n_hostname">100.64.7.51</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="7c09cdd0-d4e5-11ed-a892-356a46f3380b">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.52.55</data>
83
+ <data key="n_hostname">100.64.52.55</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="2a54f688-dfd6-11ed-a9d2-33e615983ea6">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.52.56</data>
91
+ <data key="n_hostname">100.64.52.56</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="00e11071-d452-11ed-b2f2-7be480500b36">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.52.57</data>
99
+ <data key="n_hostname">100.64.52.57</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="c542afd1-c8d3-11ed-a461-7bea8ba11e3a">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.17.248</data>
107
+ <data key="n_hostname">100.64.17.248</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="8643ce10-c8e5-11ed-a762-7be9f55697fc">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.47.17</data>
115
+ <data key="n_hostname">100.64.47.17</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.37.114</data>
123
+ <data key="n_hostname">100.64.37.114</data>
124
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="e2f44224-c854-11ed-9afd-73eabb06d50a">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.21.90</data>
131
+ <data key="n_hostname">100.64.21.90</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="74ce6333-c85d-11ed-b057-f539ce14258e">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.19.191</data>
139
+ <data key="n_hostname">100.64.19.191</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <edge id="e1" source="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3" target="HOST-4069">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1684999624</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.7</data>
149
+ <data key="e_suspicion_score">0.25</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Unprocessed</data>
156
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
157
+ </edge>
158
+ <edge id="e2" source="2ab35972-facd-11ed-af2b-e36b5e3a502a" target="HOST-3655">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1684999624</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.7</data>
163
+ <data key="e_suspicion_score">0.25</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Unprocessed</data>
170
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
171
+ </edge>
172
+ <edge id="e3" source="HOST-3655" target="2ab35972-facd-11ed-af2b-e36b5e3a502a">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1684999624</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.7</data>
177
+ <data key="e_suspicion_score">0.25</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Unprocessed</data>
184
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
185
+ </edge>
186
+ <edge id="e4" source="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3" target="HOST-3655">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1684999624</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.7</data>
191
+ <data key="e_suspicion_score">0.25</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Unprocessed</data>
198
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
199
+ </edge>
200
+ <edge id="e5" source="HOST-3655" target="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1684999624</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.7</data>
205
+ <data key="e_suspicion_score">0.25</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Unprocessed</data>
212
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
213
+ </edge>
214
+ <edge id="e6" source="HOST-4054" target="HOST-4060">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1684999624</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.7</data>
219
+ <data key="e_suspicion_score">0.25</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Unprocessed</data>
226
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
227
+ </edge>
228
+ <edge id="e7" source="HOST-4060" target="HOST-4054">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1684999624</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.7</data>
233
+ <data key="e_suspicion_score">0.25</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Unprocessed</data>
240
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
241
+ </edge>
242
+ <edge id="e8" source="HOST-4054" target="7c09cdd0-d4e5-11ed-a892-356a46f3380b">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1684999624</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.7</data>
247
+ <data key="e_suspicion_score">0.25</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Unprocessed</data>
254
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
255
+ </edge>
256
+ <edge id="e9" source="7c09cdd0-d4e5-11ed-a892-356a46f3380b" target="HOST-4054">
257
+ <data key="e_type">INCIDENT_LINK</data>
258
+ <data key="e_timestamp">1684999624</data>
259
+ <data key="e_label_binary">malicious</data>
260
+ <data key="e_label_confidence">0.7</data>
261
+ <data key="e_suspicion_score">0.25</data>
262
+ <data key="e_mo_name">Data Theft</data>
263
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
264
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
265
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
266
+ <data key="e_lifecycle_stage">complete-mission</data>
267
+ <data key="e_disposition">Unprocessed</data>
268
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
269
+ </edge>
270
+ <edge id="e10" source="2a54f688-dfd6-11ed-a9d2-33e615983ea6" target="HOST-4054">
271
+ <data key="e_type">INCIDENT_LINK</data>
272
+ <data key="e_timestamp">1684999624</data>
273
+ <data key="e_label_binary">malicious</data>
274
+ <data key="e_label_confidence">0.7</data>
275
+ <data key="e_suspicion_score">0.25</data>
276
+ <data key="e_mo_name">Data Theft</data>
277
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
278
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
279
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
280
+ <data key="e_lifecycle_stage">complete-mission</data>
281
+ <data key="e_disposition">Unprocessed</data>
282
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
283
+ </edge>
284
+ <edge id="e11" source="HOST-4054" target="2a54f688-dfd6-11ed-a9d2-33e615983ea6">
285
+ <data key="e_type">INCIDENT_LINK</data>
286
+ <data key="e_timestamp">1684999624</data>
287
+ <data key="e_label_binary">malicious</data>
288
+ <data key="e_label_confidence">0.7</data>
289
+ <data key="e_suspicion_score">0.25</data>
290
+ <data key="e_mo_name">Data Theft</data>
291
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
292
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
293
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
294
+ <data key="e_lifecycle_stage">complete-mission</data>
295
+ <data key="e_disposition">Unprocessed</data>
296
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
297
+ </edge>
298
+ <edge id="e12" source="HOST-4054" target="00e11071-d452-11ed-b2f2-7be480500b36">
299
+ <data key="e_type">INCIDENT_LINK</data>
300
+ <data key="e_timestamp">1684999624</data>
301
+ <data key="e_label_binary">malicious</data>
302
+ <data key="e_label_confidence">0.7</data>
303
+ <data key="e_suspicion_score">0.25</data>
304
+ <data key="e_mo_name">Data Theft</data>
305
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
306
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
307
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
308
+ <data key="e_lifecycle_stage">complete-mission</data>
309
+ <data key="e_disposition">Unprocessed</data>
310
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
311
+ </edge>
312
+ <edge id="e13" source="HOST-4054" target="c542afd1-c8d3-11ed-a461-7bea8ba11e3a">
313
+ <data key="e_type">INCIDENT_LINK</data>
314
+ <data key="e_timestamp">1684999624</data>
315
+ <data key="e_label_binary">malicious</data>
316
+ <data key="e_label_confidence">0.7</data>
317
+ <data key="e_suspicion_score">0.25</data>
318
+ <data key="e_mo_name">Data Theft</data>
319
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
320
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
321
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
322
+ <data key="e_lifecycle_stage">complete-mission</data>
323
+ <data key="e_disposition">Unprocessed</data>
324
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
325
+ </edge>
326
+ <edge id="e14" source="c542afd1-c8d3-11ed-a461-7bea8ba11e3a" target="HOST-4054">
327
+ <data key="e_type">INCIDENT_LINK</data>
328
+ <data key="e_timestamp">1684999624</data>
329
+ <data key="e_label_binary">malicious</data>
330
+ <data key="e_label_confidence">0.7</data>
331
+ <data key="e_suspicion_score">0.25</data>
332
+ <data key="e_mo_name">Data Theft</data>
333
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
334
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
335
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
336
+ <data key="e_lifecycle_stage">complete-mission</data>
337
+ <data key="e_disposition">Unprocessed</data>
338
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
339
+ </edge>
340
+ <edge id="e15" source="8643ce10-c8e5-11ed-a762-7be9f55697fc" target="HOST-4054">
341
+ <data key="e_type">INCIDENT_LINK</data>
342
+ <data key="e_timestamp">1684999624</data>
343
+ <data key="e_label_binary">malicious</data>
344
+ <data key="e_label_confidence">0.7</data>
345
+ <data key="e_suspicion_score">0.25</data>
346
+ <data key="e_mo_name">Data Theft</data>
347
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
348
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
349
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
350
+ <data key="e_lifecycle_stage">complete-mission</data>
351
+ <data key="e_disposition">Unprocessed</data>
352
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
353
+ </edge>
354
+ <edge id="e16" source="HOST-4054" target="8643ce10-c8e5-11ed-a762-7be9f55697fc">
355
+ <data key="e_type">INCIDENT_LINK</data>
356
+ <data key="e_timestamp">1684999624</data>
357
+ <data key="e_label_binary">malicious</data>
358
+ <data key="e_label_confidence">0.7</data>
359
+ <data key="e_suspicion_score">0.25</data>
360
+ <data key="e_mo_name">Data Theft</data>
361
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
362
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
363
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
364
+ <data key="e_lifecycle_stage">complete-mission</data>
365
+ <data key="e_disposition">Unprocessed</data>
366
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
367
+ </edge>
368
+ <edge id="e17" source="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b" target="HOST-4054">
369
+ <data key="e_type">INCIDENT_LINK</data>
370
+ <data key="e_timestamp">1684999624</data>
371
+ <data key="e_label_binary">malicious</data>
372
+ <data key="e_label_confidence">0.7</data>
373
+ <data key="e_suspicion_score">0.25</data>
374
+ <data key="e_mo_name">Data Theft</data>
375
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
376
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
377
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
378
+ <data key="e_lifecycle_stage">complete-mission</data>
379
+ <data key="e_disposition">Unprocessed</data>
380
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
381
+ </edge>
382
+ <edge id="e18" source="HOST-4054" target="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b">
383
+ <data key="e_type">INCIDENT_LINK</data>
384
+ <data key="e_timestamp">1684999624</data>
385
+ <data key="e_label_binary">malicious</data>
386
+ <data key="e_label_confidence">0.7</data>
387
+ <data key="e_suspicion_score">0.25</data>
388
+ <data key="e_mo_name">Data Theft</data>
389
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
390
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
391
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
392
+ <data key="e_lifecycle_stage">complete-mission</data>
393
+ <data key="e_disposition">Unprocessed</data>
394
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
395
+ </edge>
396
+ <edge id="e19" source="e2f44224-c854-11ed-9afd-73eabb06d50a" target="HOST-4054">
397
+ <data key="e_type">INCIDENT_LINK</data>
398
+ <data key="e_timestamp">1684999624</data>
399
+ <data key="e_label_binary">malicious</data>
400
+ <data key="e_label_confidence">0.7</data>
401
+ <data key="e_suspicion_score">0.25</data>
402
+ <data key="e_mo_name">Data Theft</data>
403
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
404
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
405
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
406
+ <data key="e_lifecycle_stage">complete-mission</data>
407
+ <data key="e_disposition">Unprocessed</data>
408
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
409
+ </edge>
410
+ <edge id="e20" source="HOST-4054" target="e2f44224-c854-11ed-9afd-73eabb06d50a">
411
+ <data key="e_type">INCIDENT_LINK</data>
412
+ <data key="e_timestamp">1684999624</data>
413
+ <data key="e_label_binary">malicious</data>
414
+ <data key="e_label_confidence">0.7</data>
415
+ <data key="e_suspicion_score">0.25</data>
416
+ <data key="e_mo_name">Data Theft</data>
417
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
418
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
419
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
420
+ <data key="e_lifecycle_stage">complete-mission</data>
421
+ <data key="e_disposition">Unprocessed</data>
422
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
423
+ </edge>
424
+ <edge id="e21" source="HOST-7434" target="HOST-4054">
425
+ <data key="e_type">INCIDENT_LINK</data>
426
+ <data key="e_timestamp">1684999624</data>
427
+ <data key="e_label_binary">malicious</data>
428
+ <data key="e_label_confidence">0.7</data>
429
+ <data key="e_suspicion_score">0.25</data>
430
+ <data key="e_mo_name">Data Theft</data>
431
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
432
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
433
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
434
+ <data key="e_lifecycle_stage">complete-mission</data>
435
+ <data key="e_disposition">Unprocessed</data>
436
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
437
+ </edge>
438
+ <edge id="e22" source="HOST-4054" target="HOST-7434">
439
+ <data key="e_type">INCIDENT_LINK</data>
440
+ <data key="e_timestamp">1684999624</data>
441
+ <data key="e_label_binary">malicious</data>
442
+ <data key="e_label_confidence">0.7</data>
443
+ <data key="e_suspicion_score">0.25</data>
444
+ <data key="e_mo_name">Data Theft</data>
445
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
446
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
447
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
448
+ <data key="e_lifecycle_stage">complete-mission</data>
449
+ <data key="e_disposition">Unprocessed</data>
450
+ <data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
451
+ </edge>
452
+ </graph>
453
+ </graphml>
graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.146</data>
43
+ <data key="n_hostname">100.64.17.146</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-4143">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713787931</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c1a1930-00a1-11ef-b5c2-73222c3b09d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fc70140-3aa3-11ee-8dff-774bbc647368">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.245.248</data>
35
+ <data key="n_hostname">172.22.245.248</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="1be59f35-2277-11ee-83ae-23da186903eb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.89</data>
43
+ <data key="n_hostname">100.64.95.89</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="ddee3c43-3569-11ee-be1e-fbdbc7e8556d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.16.46.208</data>
51
+ <data key="n_hostname">172.16.46.208</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-17148" target="1be59f35-2277-11ee-83ae-23da186903eb">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1716105495</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
69
+ </edge>
70
+ <edge id="e2" source="1be59f35-2277-11ee-83ae-23da186903eb" target="HOST-17148">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1716105495</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-17290" target="1be59f35-2277-11ee-83ae-23da186903eb">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1716105495</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
97
+ </edge>
98
+ <edge id="e4" source="1be59f35-2277-11ee-83ae-23da186903eb" target="HOST-17290">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1716105495</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="cd2bfff1-062a-11ee-ad3e-fda0da874cab">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.40</data>
43
+ <data key="n_hostname">100.64.18.40</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-4215">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830409</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml ADDED
@@ -0,0 +1,401 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a0a78300-385d-11ed-b51a-91270307622b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.144.247.94</data>
35
+ <data key="n_hostname">10.144.247.94</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.841796875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="aa80dfc1-114d-11ed-8ade-d96fa08858d6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.158</data>
43
+ <data key="n_hostname">100.64.87.158</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="6b044351-4203-11ed-972e-2bf3955d2910">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.87.159</data>
51
+ <data key="n_hostname">100.64.87.159</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="308970c1-406d-11ed-8328-1f79238d2dca">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.87.160</data>
59
+ <data key="n_hostname">100.64.87.160</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="ddec37ca-4527-11ed-bfba-b39d81f9969b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.87.161</data>
67
+ <data key="n_hostname">100.64.87.161</data>
68
+ <data key="n_set_roles">["Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.4375</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="f32b3b81-545a-11ed-a527-31b36cda0462">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.87.162</data>
75
+ <data key="n_hostname">100.64.87.162</data>
76
+ <data key="n_set_roles">["Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="50e3caa2-447d-11ed-b91d-59bda05d7bd0">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.87.163</data>
83
+ <data key="n_hostname">100.64.87.163</data>
84
+ <data key="n_set_roles">["Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="34b1a244-4bd4-11ed-b29a-3b7996557de6">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.87.164</data>
91
+ <data key="n_hostname">100.64.87.164</data>
92
+ <data key="n_set_roles">["Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="879a7355-1b60-11ed-849b-49f568a41256">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.87.165</data>
99
+ <data key="n_hostname">100.64.87.165</data>
100
+ <data key="n_set_roles">["Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="754ae744-3ed6-11ed-9a4f-99eb230f3e06">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.87.166</data>
107
+ <data key="n_hostname">100.64.87.166</data>
108
+ <data key="n_set_roles">["Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.4375</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="60068492-4555-11ed-841a-633bb6ef8f03">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.87.167</data>
115
+ <data key="n_hostname">100.64.87.167</data>
116
+ <data key="n_set_roles">["Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.4375</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="a0a78300-385d-11ed-b51a-91270307622b" target="aa80dfc1-114d-11ed-8ade-d96fa08858d6">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1672372420</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.841796875</data>
125
+ <data key="e_suspicion_score">0.841796875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
133
+ </edge>
134
+ <edge id="e2" source="aa80dfc1-114d-11ed-8ade-d96fa08858d6" target="a0a78300-385d-11ed-b51a-91270307622b">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1672372420</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.841796875</data>
139
+ <data key="e_suspicion_score">0.841796875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
147
+ </edge>
148
+ <edge id="e3" source="a0a78300-385d-11ed-b51a-91270307622b" target="6b044351-4203-11ed-972e-2bf3955d2910">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1672372420</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.841796875</data>
153
+ <data key="e_suspicion_score">0.841796875</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
161
+ </edge>
162
+ <edge id="e4" source="6b044351-4203-11ed-972e-2bf3955d2910" target="a0a78300-385d-11ed-b51a-91270307622b">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1672372420</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.841796875</data>
167
+ <data key="e_suspicion_score">0.841796875</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
175
+ </edge>
176
+ <edge id="e5" source="a0a78300-385d-11ed-b51a-91270307622b" target="308970c1-406d-11ed-8328-1f79238d2dca">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1672372420</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.841796875</data>
181
+ <data key="e_suspicion_score">0.841796875</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
189
+ </edge>
190
+ <edge id="e6" source="308970c1-406d-11ed-8328-1f79238d2dca" target="a0a78300-385d-11ed-b51a-91270307622b">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1672372420</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.841796875</data>
195
+ <data key="e_suspicion_score">0.841796875</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
203
+ </edge>
204
+ <edge id="e7" source="a0a78300-385d-11ed-b51a-91270307622b" target="ddec37ca-4527-11ed-bfba-b39d81f9969b">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1672372420</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.841796875</data>
209
+ <data key="e_suspicion_score">0.841796875</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
217
+ </edge>
218
+ <edge id="e8" source="ddec37ca-4527-11ed-bfba-b39d81f9969b" target="a0a78300-385d-11ed-b51a-91270307622b">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1672372420</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.841796875</data>
223
+ <data key="e_suspicion_score">0.841796875</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
231
+ </edge>
232
+ <edge id="e9" source="a0a78300-385d-11ed-b51a-91270307622b" target="f32b3b81-545a-11ed-a527-31b36cda0462">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1672372420</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.841796875</data>
237
+ <data key="e_suspicion_score">0.841796875</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
245
+ </edge>
246
+ <edge id="e10" source="f32b3b81-545a-11ed-a527-31b36cda0462" target="a0a78300-385d-11ed-b51a-91270307622b">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1672372420</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.841796875</data>
251
+ <data key="e_suspicion_score">0.841796875</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
259
+ </edge>
260
+ <edge id="e11" source="a0a78300-385d-11ed-b51a-91270307622b" target="50e3caa2-447d-11ed-b91d-59bda05d7bd0">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1672372420</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.841796875</data>
265
+ <data key="e_suspicion_score">0.841796875</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
273
+ </edge>
274
+ <edge id="e12" source="50e3caa2-447d-11ed-b91d-59bda05d7bd0" target="a0a78300-385d-11ed-b51a-91270307622b">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1672372420</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.841796875</data>
279
+ <data key="e_suspicion_score">0.841796875</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
287
+ </edge>
288
+ <edge id="e13" source="a0a78300-385d-11ed-b51a-91270307622b" target="34b1a244-4bd4-11ed-b29a-3b7996557de6">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1672372420</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.841796875</data>
293
+ <data key="e_suspicion_score">0.841796875</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
301
+ </edge>
302
+ <edge id="e14" source="34b1a244-4bd4-11ed-b29a-3b7996557de6" target="a0a78300-385d-11ed-b51a-91270307622b">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1672372420</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.841796875</data>
307
+ <data key="e_suspicion_score">0.841796875</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
315
+ </edge>
316
+ <edge id="e15" source="a0a78300-385d-11ed-b51a-91270307622b" target="879a7355-1b60-11ed-849b-49f568a41256">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1672372420</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.841796875</data>
321
+ <data key="e_suspicion_score">0.841796875</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
329
+ </edge>
330
+ <edge id="e16" source="879a7355-1b60-11ed-849b-49f568a41256" target="a0a78300-385d-11ed-b51a-91270307622b">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1672372420</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.841796875</data>
335
+ <data key="e_suspicion_score">0.841796875</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
343
+ </edge>
344
+ <edge id="e17" source="a0a78300-385d-11ed-b51a-91270307622b" target="754ae744-3ed6-11ed-9a4f-99eb230f3e06">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1672372420</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.841796875</data>
349
+ <data key="e_suspicion_score">0.841796875</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
357
+ </edge>
358
+ <edge id="e18" source="754ae744-3ed6-11ed-9a4f-99eb230f3e06" target="a0a78300-385d-11ed-b51a-91270307622b">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1672372420</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.841796875</data>
363
+ <data key="e_suspicion_score">0.841796875</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
371
+ </edge>
372
+ <edge id="e19" source="a0a78300-385d-11ed-b51a-91270307622b" target="60068492-4555-11ed-841a-633bb6ef8f03">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1672372420</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.841796875</data>
377
+ <data key="e_suspicion_score">0.841796875</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
385
+ </edge>
386
+ <edge id="e20" source="60068492-4555-11ed-841a-633bb6ef8f03" target="a0a78300-385d-11ed-b51a-91270307622b">
387
+ <data key="e_type">INCIDENT_LINK</data>
388
+ <data key="e_timestamp">1672372420</data>
389
+ <data key="e_label_binary">malicious</data>
390
+ <data key="e_label_confidence">0.841796875</data>
391
+ <data key="e_suspicion_score">0.841796875</data>
392
+ <data key="e_mo_name">Data Theft</data>
393
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
394
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
395
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
396
+ <data key="e_lifecycle_stage">complete-mission</data>
397
+ <data key="e_disposition">Disrupted</data>
398
+ <data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
399
+ </edge>
400
+ </graph>
401
+ </graphml>
graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c2b97d30-063a-11ee-93e5-c7d42ca5d975">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.83.16</data>
35
+ <data key="n_hostname">192.168.83.16</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="14cb17d3-063d-11ee-8fd2-af3b08029a6c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.150</data>
43
+ <data key="n_hostname">100.64.72.150</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="c2b97d30-063a-11ee-93e5-c7d42ca5d975" target="14cb17d3-063d-11ee-8fd2-af3b08029a6c">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687961434</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c4ad220-15bd-11ee-aa1e-3bafa1120b8e</data>
61
+ </edge>
62
+ <edge id="e2" source="14cb17d3-063d-11ee-8fd2-af3b08029a6c" target="c2b97d30-063a-11ee-93e5-c7d42ca5d975">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687961434</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">8c4ad220-15bd-11ee-aa1e-3bafa1120b8e</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b40b8970-a11a-11ed-a9e3-3b1569489d4f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.83.147</data>
35
+ <data key="n_hostname">100.64.83.147</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","AWS VPC Security"]</data>
39
+ </node>
40
+ <node id="0821f824-afec-11ed-84ee-5b0955f99b30">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.7.65.131</data>
43
+ <data key="n_hostname">10.7.65.131</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","AWS VPC Security"]</data>
47
+ </node>
48
+ <edge id="e1" source="b40b8970-a11a-11ed-a9e3-3b1569489d4f" target="HOST-16804">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676901034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c4e9560-b125-11ed-8c7d-65e7f37a4d8d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0821f824-afec-11ed-84ee-5b0955f99b30">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.7.65.131</data>
35
+ <data key="n_hostname">10.7.65.131</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","AWS VPC Security"]</data>
39
+ </node>
40
+ <node id="b40b8970-a11a-11ed-a9e3-3b1569489d4f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.83.147</data>
43
+ <data key="n_hostname">100.64.83.147</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","AWS VPC Security"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16804" target="HOST-16824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676901034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c532940-b125-11ed-8c7d-65e7f37a4d8d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.21.61.66</data>
35
+ <data key="n_hostname">172.21.61.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d79ff340-3633-11ee-b278-ef7c94a0d649">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.54.69</data>
43
+ <data key="n_hostname">100.64.54.69</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2709" target="d79ff340-3633-11ee-b278-ef7c94a0d649">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694888357</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="42343963-6037-11ed-b1e8-d15b4101abb9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.87.178</data>
35
+ <data key="n_hostname">100.64.87.178</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <node id="8f93e362-46cc-11ed-9451-934337ed080b">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">10.221.82.8</data>
51
+ <data key="n_hostname">USER-0015-1965.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
55
+ </node>
56
+ <edge id="e1" source="42343963-6037-11ed-b1e8-d15b4101abb9" target="HOST-16881">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1672372420</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">8c55e490-87f5-11ed-9f01-ef8ef15959cb</data>
69
+ </edge>
70
+ <edge id="e2" source="42343963-6037-11ed-b1e8-d15b4101abb9" target="HOST-16882">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1672372420</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">8c55e490-87f5-11ed-9f01-ef8ef15959cb</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="42343963-6037-11ed-b1e8-d15b4101abb9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.178</data>
43
+ <data key="n_hostname">100.64.87.178</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16881" target="HOST-17417">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1672372420</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c5aeda0-87f5-11ed-9f01-ef8ef15959cb</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1541e592-0629-11ee-b144-2b760827f5b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.149</data>
35
+ <data key="n_hostname">USER-0015-1235.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="1a05ba61-0846-11ee-af77-077611088c91">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.60.147</data>
51
+ <data key="n_hostname">100.64.60.147</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-4845" target="HOST-2839">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1687494141</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-2839" target="HOST-4845">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1687494141</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
83
+ </edge>
84
+ <edge id="e3" source="1a05ba61-0846-11ee-af77-077611088c91" target="HOST-2839">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1687494141</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-2839" target="1a05ba61-0846-11ee-af77-077611088c91">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1687494141</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="06b655f0-062a-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.229</data>
35
+ <data key="n_hostname">100.64.48.229</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8550" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686427701</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c5da680-07ca-11ee-9239-4117e3175884</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="eae6b130-0633-11ee-99c3-7bb8d56365b4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.31.163</data>
43
+ <data key="n_hostname">100.64.31.163</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-6097">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830410</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml ADDED
@@ -0,0 +1,387 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="72d36778-475a-11ee-be27-eb255d733dd4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.190</data>
35
+ <data key="n_hostname">100.64.34.190</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="d2c67860-3fef-11ee-bbba-d5415b45e911">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.54.198</data>
51
+ <data key="n_hostname">100.64.54.198</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="e06a5a92-18f3-11ee-ad5c-f9e88d6f3f2c">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.34.45</data>
59
+ <data key="n_hostname">100.64.34.45</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="6cbbb930-21a0-11ee-95b9-ad7eec260002">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.54.199</data>
67
+ <data key="n_hostname">100.64.54.199</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="29d51733-062d-11ee-b5c2-b5abc8284c6f">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.27.235</data>
75
+ <data key="n_hostname">100.64.27.235</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="751f9011-2e9d-11ee-a165-e1fd635cc763">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.54.200</data>
83
+ <data key="n_hostname">100.64.54.200</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="9c419952-064c-11ee-9144-232135dd7d16">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.51.202</data>
91
+ <data key="n_hostname">100.64.51.202</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="c2e32da1-062c-11ee-85b9-c1d3d8d0c43c">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.20.210</data>
99
+ <data key="n_hostname">100.64.20.210</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="5d6530d4-669f-11ee-b79c-19726371883f">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.54.201</data>
107
+ <data key="n_hostname">100.64.54.201</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.578125</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="cdf30832-0624-11ee-9a87-6114210b307b">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.46.236</data>
115
+ <data key="n_hostname">100.64.46.236</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.7890625</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="HOST-7911" target="HOST-2703">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1697599341</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.9208984375</data>
125
+ <data key="e_suspicion_score">0.9208984375</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-2703" target="HOST-7911">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1697599341</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.9208984375</data>
139
+ <data key="e_suspicion_score">0.9208984375</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
147
+ </edge>
148
+ <edge id="e3" source="d2c67860-3fef-11ee-bbba-d5415b45e911" target="HOST-2703">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1697599341</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.9208984375</data>
153
+ <data key="e_suspicion_score">0.9208984375</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
161
+ </edge>
162
+ <edge id="e4" source="HOST-2703" target="d2c67860-3fef-11ee-bbba-d5415b45e911">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1697599341</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.9208984375</data>
167
+ <data key="e_suspicion_score">0.9208984375</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
175
+ </edge>
176
+ <edge id="e5" source="HOST-6427" target="HOST-2703">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1697599341</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.9208984375</data>
181
+ <data key="e_suspicion_score">0.9208984375</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-2703" target="HOST-6427">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1697599341</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.9208984375</data>
195
+ <data key="e_suspicion_score">0.9208984375</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
203
+ </edge>
204
+ <edge id="e7" source="6cbbb930-21a0-11ee-95b9-ad7eec260002" target="HOST-2703">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1697599341</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.9208984375</data>
209
+ <data key="e_suspicion_score">0.9208984375</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
217
+ </edge>
218
+ <edge id="e8" source="HOST-2703" target="6cbbb930-21a0-11ee-95b9-ad7eec260002">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1697599341</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.9208984375</data>
223
+ <data key="e_suspicion_score">0.9208984375</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
231
+ </edge>
232
+ <edge id="e9" source="HOST-7349" target="HOST-2703">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1697599341</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.9208984375</data>
237
+ <data key="e_suspicion_score">0.9208984375</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-2703" target="HOST-7349">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1697599341</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.9208984375</data>
251
+ <data key="e_suspicion_score">0.9208984375</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
259
+ </edge>
260
+ <edge id="e11" source="751f9011-2e9d-11ee-a165-e1fd635cc763" target="HOST-2703">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1697599341</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.9208984375</data>
265
+ <data key="e_suspicion_score">0.9208984375</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-2703" target="751f9011-2e9d-11ee-a165-e1fd635cc763">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1697599341</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.9208984375</data>
279
+ <data key="e_suspicion_score">0.9208984375</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
287
+ </edge>
288
+ <edge id="e13" source="HOST-8963" target="HOST-2703">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1697599341</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.9208984375</data>
293
+ <data key="e_suspicion_score">0.9208984375</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-2703" target="HOST-8963">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1697599341</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.9208984375</data>
307
+ <data key="e_suspicion_score">0.9208984375</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
315
+ </edge>
316
+ <edge id="e15" source="HOST-4570" target="HOST-2703">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1697599341</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.9208984375</data>
321
+ <data key="e_suspicion_score">0.9208984375</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-2703" target="HOST-4570">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1697599341</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.9208984375</data>
335
+ <data key="e_suspicion_score">0.9208984375</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
343
+ </edge>
344
+ <edge id="e17" source="5d6530d4-669f-11ee-b79c-19726371883f" target="HOST-2703">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1697599341</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.9208984375</data>
349
+ <data key="e_suspicion_score">0.9208984375</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
357
+ </edge>
358
+ <edge id="e18" source="HOST-2703" target="5d6530d4-669f-11ee-b79c-19726371883f">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1697599341</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.9208984375</data>
363
+ <data key="e_suspicion_score">0.9208984375</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
371
+ </edge>
372
+ <edge id="e19" source="HOST-2703" target="HOST-8267">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1697599341</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.9208984375</data>
377
+ <data key="e_suspicion_score">0.9208984375</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
385
+ </edge>
386
+ </graph>
387
+ </graphml>
graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a63c87d0-064c-11ee-abbb-3f6268c49351">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.42</data>
43
+ <data key="n_hostname">100.64.11.42</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="HOST-3269">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830410</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5a9ec460-0795-11ee-ad7f-0117287bd13d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.156</data>
35
+ <data key="n_hostname">100.64.15.156</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3871" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694888357</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c793590-54bd-11ee-8e2f-e12aa4f0d6f4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml ADDED
@@ -0,0 +1,107 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="939e9981-0627-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.25</data>
35
+ <data key="n_hostname">100.64.12.25</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">10.135.251.191</data>
51
+ <data key="n_hostname">10.135.251.191</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.31.11.166</data>
59
+ <data key="n_hostname">172.31.11.166</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-3373" target="HOST-2706">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1697352810</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-3373" target="HOST-2751">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1697352810</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-3373" target="HOST-2711">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1697352810</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
105
+ </edge>
106
+ </graph>
107
+ </graphml>
graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a63c87d0-064c-11ee-abbb-3f6268c49351">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.42</data>
35
+ <data key="n_hostname">100.64.11.42</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.86.34</data>
43
+ <data key="n_hostname">172.23.86.34</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3269" target="HOST-2717">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830410</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="06b655f0-062a-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.48.229</data>
43
+ <data key="n_hostname">100.64.48.229</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-8550">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686427701</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c83cc20-07ca-11ee-9239-4117e3175884</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5a9ec460-0795-11ee-ad7f-0117287bd13d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.156</data>
43
+ <data key="n_hostname">100.64.15.156</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2750" target="HOST-3871">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694888357</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">100.64.6.199</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="a29c2db2-0e9e-11ee-917c-63d93d021290">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.192</data>
43
+ <data key="n_hostname">100.64.19.192</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17001" target="a29c2db2-0e9e-11ee-917c-63d93d021290">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714616001</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8c9ceab0-0829-11ef-9432-0316676438e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e08bce80-3a1f-11ee-804e-7bda33583aba">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.49.202</data>
35
+ <data key="n_hostname">100.64.49.202</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="e08bce80-3a1f-11ee-804e-7bda33583aba" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830410</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="11b2c2b4-079a-11ee-a602-0181fec44f3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.107</data>
35
+ <data key="n_hostname">100.64.53.107</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="4c3f35e0-119e-11ee-bc47-d1754d41a953">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.10.168</data>
51
+ <data key="n_hostname">100.64.10.168</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b70574c1-0681-11ee-b53a-5d6415135f30">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.53.108</data>
59
+ <data key="n_hostname">100.64.53.108</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="9a6a1a00-0627-11ee-b19f-ed665a42340f">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.24.62</data>
67
+ <data key="n_hostname">100.64.24.62</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="3770a660-6443-11ee-a136-af2d82818db7">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.53.109</data>
75
+ <data key="n_hostname">100.64.53.109</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="11b2c2b4-079a-11ee-a602-0181fec44f3c" target="HOST-2858">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1703211575</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.841796875</data>
85
+ <data key="e_suspicion_score">0.841796875</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-2858" target="11b2c2b4-079a-11ee-a602-0181fec44f3c">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1703211575</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.841796875</data>
99
+ <data key="e_suspicion_score">0.841796875</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-3194" target="HOST-2858">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1703211575</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.841796875</data>
113
+ <data key="e_suspicion_score">0.841796875</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-2858" target="HOST-3194">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1703211575</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.841796875</data>
127
+ <data key="e_suspicion_score">0.841796875</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
135
+ </edge>
136
+ <edge id="e5" source="b70574c1-0681-11ee-b53a-5d6415135f30" target="HOST-2858">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1703211575</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.841796875</data>
141
+ <data key="e_suspicion_score">0.841796875</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-2858" target="b70574c1-0681-11ee-b53a-5d6415135f30">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1703211575</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.841796875</data>
155
+ <data key="e_suspicion_score">0.841796875</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
163
+ </edge>
164
+ <edge id="e7" source="HOST-5043" target="HOST-2858">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1703211575</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.841796875</data>
169
+ <data key="e_suspicion_score">0.841796875</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-2858" target="HOST-5043">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1703211575</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.841796875</data>
183
+ <data key="e_suspicion_score">0.841796875</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
191
+ </edge>
192
+ <edge id="e9" source="3770a660-6443-11ee-a136-af2d82818db7" target="HOST-2858">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1703211575</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.841796875</data>
197
+ <data key="e_suspicion_score">0.841796875</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-2858" target="3770a660-6443-11ee-a136-af2d82818db7">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1703211575</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.841796875</data>
211
+ <data key="e_suspicion_score">0.841796875</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c06c05f5-105a-11ee-824a-e5bb4f313279">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.54.98</data>
35
+ <data key="n_hostname">100.64.54.98</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="589b8491-104c-11ee-bd12-05689cf440e1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">10.184.211.180</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17033" target="HOST-17315">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714616001</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">8caf3a30-0829-11ef-9432-0316676438e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e08bce80-3a1f-11ee-804e-7bda33583aba">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.49.202</data>
43
+ <data key="n_hostname">100.64.49.202</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-8676">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697830410</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="07f28d90-2900-11ef-9c4f-074efb30849a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.59.91</data>
35
+ <data key="n_hostname">172.30.59.91</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="1f53e53a-29c6-11ef-a7e4-cfafb31db32d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.77.161</data>
43
+ <data key="n_hostname">USER-0015-2122.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17260" target="1f53e53a-29c6-11ef-a7e4-cfafb31db32d">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1720457587</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.578125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8cb6a8f0-3d4a-11ef-b144-c9d8335db792</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.101</data>
35
+ <data key="n_hostname">100.64.18.101</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="36d68130-0628-11ee-b3b1-23c171fd7d30">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.89</data>
43
+ <data key="n_hostname">100.64.73.89</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e" target="HOST-13275">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688490145</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13275" target="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688490145</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.21.195.227</data>
35
+ <data key="n_hostname">172.21.195.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.841796875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.89.34</data>
43
+ <data key="n_hostname">100.64.89.34</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="09652000-9de4-11ed-8f95-5d1d6230162f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.90.112</data>
51
+ <data key="n_hostname">100.64.90.112</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="fdada9b1-9dbd-11ed-9e2f-a52f5f954014">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.90.113</data>
59
+ <data key="n_hostname">100.64.90.113</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.88.243</data>
67
+ <data key="n_hostname">100.64.88.243</data>
68
+ <data key="n_set_roles">["Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.4375</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1679447521</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.841796875</data>
77
+ <data key="e_suspicion_score">0.841796875</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
85
+ </edge>
86
+ <edge id="e2" source="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1679447521</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.841796875</data>
91
+ <data key="e_suspicion_score">0.841796875</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
99
+ </edge>
100
+ <edge id="e3" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="09652000-9de4-11ed-8f95-5d1d6230162f">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1679447521</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.841796875</data>
105
+ <data key="e_suspicion_score">0.841796875</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
113
+ </edge>
114
+ <edge id="e4" source="09652000-9de4-11ed-8f95-5d1d6230162f" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1679447521</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.841796875</data>
119
+ <data key="e_suspicion_score">0.841796875</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
127
+ </edge>
128
+ <edge id="e5" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="fdada9b1-9dbd-11ed-9e2f-a52f5f954014">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1679447521</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.841796875</data>
133
+ <data key="e_suspicion_score">0.841796875</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
141
+ </edge>
142
+ <edge id="e6" source="fdada9b1-9dbd-11ed-9e2f-a52f5f954014" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1679447521</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.841796875</data>
147
+ <data key="e_suspicion_score">0.841796875</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
155
+ </edge>
156
+ <edge id="e7" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1679447521</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.841796875</data>
161
+ <data key="e_suspicion_score">0.841796875</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
169
+ </edge>
170
+ <edge id="e8" source="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1679447521</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.841796875</data>
175
+ <data key="e_suspicion_score">0.841796875</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="831476a0-1411-11ee-9b3a-cffef1e71f38">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.65.70</data>
35
+ <data key="n_hostname">100.64.65.70</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="831476a0-1411-11ee-9b3a-cffef1e71f38" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687777610</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">8cb9cb10-1411-11ee-918c-e193118b03e7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>