Upload per-incident GraphML sharded batch 15/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
- graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
- graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml +63 -0
- graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml +401 -0
- graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
- graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
- graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml +113 -0
- graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml +63 -0
- graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml +63 -0
- graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml +185 -0
- graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml +113 -0
- graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
- graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml +149 -0
- graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml +77 -0
- graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
- graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
- graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml +63 -0
- graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
- graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml +229 -0
- graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml +63 -0
- graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml +453 -0
- graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml +63 -0
- graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml +113 -0
- graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml +401 -0
- graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml +77 -0
- graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml +63 -0
- graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml +63 -0
- graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
- graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml +85 -0
- graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml +63 -0
- graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml +113 -0
- graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml +63 -0
- graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml +387 -0
- graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
- graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml +107 -0
- graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml +63 -0
- graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml +63 -0
- graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml +63 -0
- graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml +221 -0
- graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml +63 -0
- graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml +63 -0
- graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml +63 -0
- graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml +77 -0
- graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml +185 -0
- graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml +63 -0
graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.200.243</data>
|
| 35 |
+
<data key="n_hostname">172.30.200.243</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ad4a5330-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.19.168</data>
|
| 43 |
+
<data key="n_hostname">100.64.19.168</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2706" target="HOST-4424">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697352808</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8b7bff80-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0da097e2-32b2-11ee-a1fb-4f54f91a66cd">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.224</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.224</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.101.1</data>
|
| 43 |
+
<data key="n_hostname">172.31.101.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="0da097e2-32b2-11ee-a1fb-4f54f91a66cd" target="HOST-2821">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699094847</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8b893be0-7aff-11ee-a7a4-7da27d63d8ce</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5d22cb81-2bae-11ef-a950-4769d5827564">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.221.82.8</data>
|
| 35 |
+
<data key="n_hostname">10.221.82.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="11ee3605-2919-11ef-95d6-394fbc009d95">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.51.72</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-2121.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17021" target="HOST-18660">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1720457585</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8b8e2e80-3d4a-11ef-b144-c9d8335db792</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml
ADDED
|
@@ -0,0 +1,401 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b15c67a2-164d-11ee-bd1e-998fe709eb0f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.77.192</data>
|
| 35 |
+
<data key="n_hostname">100.64.77.192</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a0c95611-0625-11ee-aab2-71eb81956b3c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.103</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.103</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="a54ad4a3-0627-11ee-98c4-03fbbffc96a5">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.72.72</data>
|
| 51 |
+
<data key="n_hostname">100.64.72.72</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="a3d64a22-0634-11ee-9292-037474792a78">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.11.123</data>
|
| 59 |
+
<data key="n_hostname">100.64.11.123</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="8fe532a0-0635-11ee-a150-c9b826c4d475">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.60.227</data>
|
| 67 |
+
<data key="n_hostname">100.64.60.227</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="b180f2d3-0637-11ee-a699-19fd706a4513">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.12.47</data>
|
| 75 |
+
<data key="n_hostname">100.64.12.47</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 78 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="51882a70-062c-11ee-a961-f3aa8f0c341a">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.72.196</data>
|
| 83 |
+
<data key="n_hostname">100.64.72.196</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 86 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="26e5fcd0-0649-11ee-b879-8fa356303378">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.6.6</data>
|
| 91 |
+
<data key="n_hostname">100.64.6.6</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 94 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="ef569e61-0647-11ee-97f2-25a892db4607">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.32.52</data>
|
| 99 |
+
<data key="n_hostname">USER-0015-1764.example.internal</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="505cd130-0629-11ee-9082-893f136cddbf">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.14.18</data>
|
| 107 |
+
<data key="n_hostname">100.64.14.18</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 110 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="cac95f30-0627-11ee-8ffb-516c3122460e">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.7.113</data>
|
| 115 |
+
<data key="n_hostname">100.64.7.113</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 118 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="b15c67a2-164d-11ee-bd1e-998fe709eb0f" target="HOST-12898">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1688107462</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 125 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-12898" target="b15c67a2-164d-11ee-bd1e-998fe709eb0f">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1688107462</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 139 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="HOST-14615" target="a3d64a22-0634-11ee-9292-037474792a78">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1688107462</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 153 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Disrupted</data>
|
| 160 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="a3d64a22-0634-11ee-9292-037474792a78" target="HOST-14615">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1688107462</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 167 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Disrupted</data>
|
| 174 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="8fe532a0-0635-11ee-a150-c9b826c4d475" target="HOST-14615">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1688107462</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 181 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Disrupted</data>
|
| 188 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-14615" target="8fe532a0-0635-11ee-a150-c9b826c4d475">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1688107462</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 195 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Disrupted</data>
|
| 202 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="HOST-12898" target="a3d64a22-0634-11ee-9292-037474792a78">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1688107462</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 209 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Disrupted</data>
|
| 216 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="a3d64a22-0634-11ee-9292-037474792a78" target="HOST-12898">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1688107462</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 223 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Disrupted</data>
|
| 230 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="b180f2d3-0637-11ee-a699-19fd706a4513" target="HOST-12898">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1688107462</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 237 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Disrupted</data>
|
| 244 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="HOST-12898" target="b180f2d3-0637-11ee-a699-19fd706a4513">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1688107462</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 251 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Disrupted</data>
|
| 258 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="b180f2d3-0637-11ee-a699-19fd706a4513" target="HOST-13065">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1688107462</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 265 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Disrupted</data>
|
| 272 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-13065" target="b180f2d3-0637-11ee-a699-19fd706a4513">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1688107462</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 279 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Disrupted</data>
|
| 286 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="26e5fcd0-0649-11ee-b879-8fa356303378" target="HOST-13065">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1688107462</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 293 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Disrupted</data>
|
| 300 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-13065" target="26e5fcd0-0649-11ee-b879-8fa356303378">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1688107462</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 307 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Disrupted</data>
|
| 314 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="ef569e61-0647-11ee-97f2-25a892db4607" target="HOST-12898">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1688107462</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 321 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Disrupted</data>
|
| 328 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-12898" target="ef569e61-0647-11ee-97f2-25a892db4607">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1688107462</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 335 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Disrupted</data>
|
| 342 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="505cd130-0629-11ee-9082-893f136cddbf" target="HOST-12898">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1688107462</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 349 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Disrupted</data>
|
| 356 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="HOST-12898" target="505cd130-0629-11ee-9082-893f136cddbf">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1688107462</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 363 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Disrupted</data>
|
| 370 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="HOST-14252" target="HOST-13065">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1688107462</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 377 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Disrupted</data>
|
| 384 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 385 |
+
</edge>
|
| 386 |
+
<edge id="e20" source="HOST-13065" target="HOST-14252">
|
| 387 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 388 |
+
<data key="e_timestamp">1688107462</data>
|
| 389 |
+
<data key="e_label_binary">malicious</data>
|
| 390 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 391 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 392 |
+
<data key="e_mo_name">Data Theft</data>
|
| 393 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 394 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 395 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 396 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 397 |
+
<data key="e_disposition">Disrupted</data>
|
| 398 |
+
<data key="e_incident_id">8b8eab90-1711-11ee-87cc-f345d7566905</data>
|
| 399 |
+
</edge>
|
| 400 |
+
</graph>
|
| 401 |
+
</graphml>
|
graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.101.1</data>
|
| 35 |
+
<data key="n_hostname">172.31.101.1</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="0da097e2-32b2-11ee-a1fb-4f54f91a66cd">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.17.224</data>
|
| 43 |
+
<data key="n_hostname">100.64.17.224</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2821" target="HOST-4177">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699094847</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8b98a530-7aff-11ee-a7a4-7da27d63d8ce</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2de88e31-078e-11ee-a636-b3ac657d8f21">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.38.63</data>
|
| 35 |
+
<data key="n_hostname">100.64.38.63</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.117.12.163</data>
|
| 43 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="2de88e31-078e-11ee-a636-b3ac657d8f21" target="HOST-2773">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697352808</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8b98d650-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="868f3044-020f-11ee-9a6f-614d58ccafa0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.74.66</data>
|
| 35 |
+
<data key="n_hostname">100.64.74.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="de284403-9d87-11ed-98f8-cd6642d241c0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.41</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.41</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="1901dec1-f97b-11ed-b4c9-cb1d93e9067a">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.29.39</data>
|
| 51 |
+
<data key="n_hostname">100.64.29.39</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="868f3044-020f-11ee-9a6f-614d58ccafa0" target="de284403-9d87-11ed-98f8-cd6642d241c0">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1685797628</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.71875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="de284403-9d87-11ed-98f8-cd6642d241c0" target="868f3044-020f-11ee-9a6f-614d58ccafa0">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1685797628</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.71875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="HOST-13046" target="de284403-9d87-11ed-98f8-cd6642d241c0">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1685797628</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.71875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="de284403-9d87-11ed-98f8-cd6642d241c0" target="HOST-13046">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1685797628</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.71875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">8b9e5ac0-020f-11ee-be0c-f125b7f6022a</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="672d3023-51b1-11ee-8a7d-ff18061dc4f4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.226</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.226</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.21.61.66</data>
|
| 43 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="672d3023-51b1-11ee-8a7d-ff18061dc4f4" target="HOST-2709">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699094847</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.117.12.163</data>
|
| 35 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2de88e31-078e-11ee-a636-b3ac657d8f21">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.38.63</data>
|
| 43 |
+
<data key="n_hostname">100.64.38.63</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2773" target="HOST-6969">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697352808</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8ba72e30-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml
ADDED
|
@@ -0,0 +1,185 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7b14bf03-0633-11ee-a0c5-27e8caf8506a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.73.58</data>
|
| 35 |
+
<data key="n_hostname">100.64.73.58</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="82df7850-0639-11ee-9d16-b90ac473a2f2">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.12.88</data>
|
| 43 |
+
<data key="n_hostname">100.64.12.88</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="ed690132-0631-11ee-be55-af682c51cd88">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.73.75</data>
|
| 51 |
+
<data key="n_hostname">100.64.73.75</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="eef540a0-1d55-11ee-b7a2-f1b82e743eba">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.77.43</data>
|
| 59 |
+
<data key="n_hostname">100.64.77.43</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="528721e0-0642-11ee-b879-8fa356303378">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.72.51</data>
|
| 67 |
+
<data key="n_hostname">100.64.72.51</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="HOST-13591" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1689002103</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.7</data>
|
| 77 |
+
<data key="e_suspicion_score">0.25</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Unprocessed</data>
|
| 84 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-13591">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1689002103</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.7</data>
|
| 91 |
+
<data key="e_suspicion_score">0.25</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Unprocessed</data>
|
| 98 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-13250">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1689002103</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.7</data>
|
| 105 |
+
<data key="e_suspicion_score">0.25</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Unprocessed</data>
|
| 112 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="HOST-13250" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1689002103</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.7</data>
|
| 119 |
+
<data key="e_suspicion_score">0.25</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Unprocessed</data>
|
| 126 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="eef540a0-1d55-11ee-b7a2-f1b82e743eba" target="HOST-13591">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1689002103</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.7</data>
|
| 133 |
+
<data key="e_suspicion_score">0.25</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Unprocessed</data>
|
| 140 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="HOST-13591" target="eef540a0-1d55-11ee-b7a2-f1b82e743eba">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1689002103</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.7</data>
|
| 147 |
+
<data key="e_suspicion_score">0.25</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Unprocessed</data>
|
| 154 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 155 |
+
</edge>
|
| 156 |
+
<edge id="e7" source="82df7850-0639-11ee-9d16-b90ac473a2f2" target="HOST-14268">
|
| 157 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 158 |
+
<data key="e_timestamp">1689002103</data>
|
| 159 |
+
<data key="e_label_binary">malicious</data>
|
| 160 |
+
<data key="e_label_confidence">0.7</data>
|
| 161 |
+
<data key="e_suspicion_score">0.25</data>
|
| 162 |
+
<data key="e_mo_name">Data Theft</data>
|
| 163 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 164 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 165 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 166 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 167 |
+
<data key="e_disposition">Unprocessed</data>
|
| 168 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 169 |
+
</edge>
|
| 170 |
+
<edge id="e8" source="HOST-14268" target="82df7850-0639-11ee-9d16-b90ac473a2f2">
|
| 171 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 172 |
+
<data key="e_timestamp">1689002103</data>
|
| 173 |
+
<data key="e_label_binary">malicious</data>
|
| 174 |
+
<data key="e_label_confidence">0.7</data>
|
| 175 |
+
<data key="e_suspicion_score">0.25</data>
|
| 176 |
+
<data key="e_mo_name">Data Theft</data>
|
| 177 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 178 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 179 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 180 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 181 |
+
<data key="e_disposition">Unprocessed</data>
|
| 182 |
+
<data key="e_incident_id">8bc30b80-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 183 |
+
</edge>
|
| 184 |
+
</graph>
|
| 185 |
+
</graphml>
|
graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f864be42-0199-11ee-9d93-8fff534112a0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.74.67</data>
|
| 35 |
+
<data key="n_hostname">100.64.74.67</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.228</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1671.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Umbrella","Meraki","Cisco Meraki Firewall","Stealthwatch","Windows Active Directory"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.74.68</data>
|
| 51 |
+
<data key="n_hostname">100.64.74.68</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="f864be42-0199-11ee-9d93-8fff534112a0" target="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1685797628</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.71875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="9c3d10a2-a1df-11ed-b350-afafcd1b69a1" target="f864be42-0199-11ee-9d93-8fff534112a0">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1685797628</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.71875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea" target="9c3d10a2-a1df-11ed-b350-afafcd1b69a1">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1685797628</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.71875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="9c3d10a2-a1df-11ed-b350-afafcd1b69a1" target="3976a1e0-01d2-11ee-9e9a-f9e5d76502ea">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1685797628</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.71875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">8bc6a340-020f-11ee-be0c-f125b7f6022a</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.191.229</data>
|
| 35 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c2195426-2d1f-11ee-ba9c-4f54325a287e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.20.102</data>
|
| 43 |
+
<data key="n_hostname">100.64.20.102</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2839" target="HOST-4517">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713787930</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8bd37340-00a1-11ef-b5c2-73222c3b09d8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
ADDED
|
@@ -0,0 +1,149 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="16f1c170-ea92-11ec-90c7-eff83c975df3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.81.214</data>
|
| 35 |
+
<data key="n_hostname">100.64.81.214</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e673a9a0-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.1.49</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1822.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.81.215</data>
|
| 51 |
+
<data key="n_hostname">100.64.81.215</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="dd611f50-ea91-11ec-abf7-619673fe2558">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.73.89</data>
|
| 59 |
+
<data key="n_hostname">100.64.73.89</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="16f1c170-ea92-11ec-90c7-eff83c975df3" target="HOST-15260">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1656543747</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.7</data>
|
| 69 |
+
<data key="e_suspicion_score">0.25</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Unprocessed</data>
|
| 76 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-15260" target="16f1c170-ea92-11ec-90c7-eff83c975df3">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1656543747</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.7</data>
|
| 83 |
+
<data key="e_suspicion_score">0.25</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Unprocessed</data>
|
| 90 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6" target="HOST-15260">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1656543747</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.7</data>
|
| 97 |
+
<data key="e_suspicion_score">0.25</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Unprocessed</data>
|
| 104 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 105 |
+
</edge>
|
| 106 |
+
<edge id="e4" source="HOST-15260" target="97ec4e14-f7ff-11ec-a0aa-657ed774e8e6">
|
| 107 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 108 |
+
<data key="e_timestamp">1656543747</data>
|
| 109 |
+
<data key="e_label_binary">malicious</data>
|
| 110 |
+
<data key="e_label_confidence">0.7</data>
|
| 111 |
+
<data key="e_suspicion_score">0.25</data>
|
| 112 |
+
<data key="e_mo_name">Data Theft</data>
|
| 113 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 114 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 115 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 116 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 117 |
+
<data key="e_disposition">Unprocessed</data>
|
| 118 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 119 |
+
</edge>
|
| 120 |
+
<edge id="e5" source="16f1c170-ea92-11ec-90c7-eff83c975df3" target="HOST-14764">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1656543747</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7</data>
|
| 125 |
+
<data key="e_suspicion_score">0.25</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Unprocessed</data>
|
| 132 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e6" source="HOST-14764" target="16f1c170-ea92-11ec-90c7-eff83c975df3">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1656543747</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7</data>
|
| 139 |
+
<data key="e_suspicion_score">0.25</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Unprocessed</data>
|
| 146 |
+
<data key="e_incident_id">8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2</data>
|
| 147 |
+
</edge>
|
| 148 |
+
</graph>
|
| 149 |
+
</graphml>
|
graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.232.245</data>
|
| 35 |
+
<data key="n_hostname">192.168.232.245</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="50347f55-0642-11ee-a474-c1a66c71fe5c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.77.44</data>
|
| 43 |
+
<data key="n_hostname">100.64.77.44</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7" target="50347f55-0642-11ee-a474-c1a66c71fe5c">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689002104</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8bd8b660-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="50347f55-0642-11ee-a474-c1a66c71fe5c" target="f8f858b4-0ace-11ee-8c0e-bdf7fc6cb2b7">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1689002104</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">8bd8b660-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="cdd42780-26e6-11ed-85c0-314d1b5c3437">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.95.111</data>
|
| 35 |
+
<data key="n_hostname">100.64.95.111</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e07bd5c8-1e37-11ed-af4e-c398b832a4a0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.207.79.45</data>
|
| 43 |
+
<data key="n_hostname">100.64.84.55</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="cdd42780-26e6-11ed-85c0-314d1b5c3437" target="HOST-17027">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1666892900</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8be8ad10-561f-11ed-90b9-dd5c5c82d817</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e07bd5c8-1e37-11ed-af4e-c398b832a4a0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.207.79.45</data>
|
| 35 |
+
<data key="n_hostname">100.64.84.55</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cdd42780-26e6-11ed-85c0-314d1b5c3437">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.111</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.111</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17027" target="HOST-18796">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1666892900</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8bec5690-561f-11ed-90b9-dd5c5c82d817</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ab33c381-f49a-11ec-acf0-6ba76852b533">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.55.52.223</data>
|
| 35 |
+
<data key="n_hostname">10.55.52.223</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f1d261a1-4d5c-11ed-b58e-8b5e2baf72e4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.113</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.113</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16895" target="f1d261a1-4d5c-11ed-b58e-8b5e2baf72e4">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1666892901</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8bf07540-561f-11ed-90b9-dd5c5c82d817</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.146</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.146</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-4143" target="HOST-2858">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713787931</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml
ADDED
|
@@ -0,0 +1,229 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7d1affa6-3df4-11ee-b5fb-0bfdba910d64">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.23.203</data>
|
| 35 |
+
<data key="n_hostname">100.64.23.203</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="be6bda84-0625-11ee-9f36-61ae8743c399">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.22</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.22</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="094cdc20-0626-11ee-9f36-61ae8743c399">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.68.14</data>
|
| 51 |
+
<data key="n_hostname">100.64.68.14</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="0027f7c6-0625-11ee-9290-9f7f8caf087f">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.68.31</data>
|
| 59 |
+
<data key="n_hostname">100.64.68.31</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="7df26782-51b6-11ee-b4eb-e37aff9ad59e">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.11.153</data>
|
| 67 |
+
<data key="n_hostname">100.64.11.153</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="f7c3d5e7-0624-11ee-b0df-0ffd69bf48e8">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.18.249</data>
|
| 75 |
+
<data key="n_hostname">100.64.18.249</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="094cdc22-0626-11ee-9f36-61ae8743c399">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.68.45</data>
|
| 83 |
+
<data key="n_hostname">100.64.68.45</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<edge id="e1" source="HOST-11918" target="HOST-11392">
|
| 89 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 90 |
+
<data key="e_timestamp">1695745632</data>
|
| 91 |
+
<data key="e_label_binary">malicious</data>
|
| 92 |
+
<data key="e_label_confidence">0.7</data>
|
| 93 |
+
<data key="e_suspicion_score">0.25</data>
|
| 94 |
+
<data key="e_mo_name">Data Theft</data>
|
| 95 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 96 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 97 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 98 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 99 |
+
<data key="e_disposition">Unprocessed</data>
|
| 100 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 101 |
+
</edge>
|
| 102 |
+
<edge id="e2" source="HOST-11392" target="HOST-11918">
|
| 103 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 104 |
+
<data key="e_timestamp">1695745632</data>
|
| 105 |
+
<data key="e_label_binary">malicious</data>
|
| 106 |
+
<data key="e_label_confidence">0.7</data>
|
| 107 |
+
<data key="e_suspicion_score">0.25</data>
|
| 108 |
+
<data key="e_mo_name">Data Theft</data>
|
| 109 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 110 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 111 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 112 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 113 |
+
<data key="e_disposition">Unprocessed</data>
|
| 114 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 115 |
+
</edge>
|
| 116 |
+
<edge id="e3" source="HOST-11918" target="HOST-11377">
|
| 117 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 118 |
+
<data key="e_timestamp">1695745632</data>
|
| 119 |
+
<data key="e_label_binary">malicious</data>
|
| 120 |
+
<data key="e_label_confidence">0.7</data>
|
| 121 |
+
<data key="e_suspicion_score">0.25</data>
|
| 122 |
+
<data key="e_mo_name">Data Theft</data>
|
| 123 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 124 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 125 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 126 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 127 |
+
<data key="e_disposition">Unprocessed</data>
|
| 128 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 129 |
+
</edge>
|
| 130 |
+
<edge id="e4" source="HOST-11377" target="HOST-11918">
|
| 131 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 132 |
+
<data key="e_timestamp">1695745632</data>
|
| 133 |
+
<data key="e_label_binary">malicious</data>
|
| 134 |
+
<data key="e_label_confidence">0.7</data>
|
| 135 |
+
<data key="e_suspicion_score">0.25</data>
|
| 136 |
+
<data key="e_mo_name">Data Theft</data>
|
| 137 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 138 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 139 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 140 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 141 |
+
<data key="e_disposition">Unprocessed</data>
|
| 142 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 143 |
+
</edge>
|
| 144 |
+
<edge id="e5" source="HOST-11918" target="HOST-11404">
|
| 145 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 146 |
+
<data key="e_timestamp">1695745632</data>
|
| 147 |
+
<data key="e_label_binary">malicious</data>
|
| 148 |
+
<data key="e_label_confidence">0.7</data>
|
| 149 |
+
<data key="e_suspicion_score">0.25</data>
|
| 150 |
+
<data key="e_mo_name">Data Theft</data>
|
| 151 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 152 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 153 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 154 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 155 |
+
<data key="e_disposition">Unprocessed</data>
|
| 156 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 157 |
+
</edge>
|
| 158 |
+
<edge id="e6" source="HOST-11404" target="HOST-11918">
|
| 159 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 160 |
+
<data key="e_timestamp">1695745632</data>
|
| 161 |
+
<data key="e_label_binary">malicious</data>
|
| 162 |
+
<data key="e_label_confidence">0.7</data>
|
| 163 |
+
<data key="e_suspicion_score">0.25</data>
|
| 164 |
+
<data key="e_mo_name">Data Theft</data>
|
| 165 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 166 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 167 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 168 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 169 |
+
<data key="e_disposition">Unprocessed</data>
|
| 170 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 171 |
+
</edge>
|
| 172 |
+
<edge id="e7" source="7df26782-51b6-11ee-b4eb-e37aff9ad59e" target="HOST-11377">
|
| 173 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 174 |
+
<data key="e_timestamp">1695745632</data>
|
| 175 |
+
<data key="e_label_binary">malicious</data>
|
| 176 |
+
<data key="e_label_confidence">0.7</data>
|
| 177 |
+
<data key="e_suspicion_score">0.25</data>
|
| 178 |
+
<data key="e_mo_name">Data Theft</data>
|
| 179 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 180 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 181 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 182 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 183 |
+
<data key="e_disposition">Unprocessed</data>
|
| 184 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 185 |
+
</edge>
|
| 186 |
+
<edge id="e8" source="HOST-11377" target="7df26782-51b6-11ee-b4eb-e37aff9ad59e">
|
| 187 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 188 |
+
<data key="e_timestamp">1695745632</data>
|
| 189 |
+
<data key="e_label_binary">malicious</data>
|
| 190 |
+
<data key="e_label_confidence">0.7</data>
|
| 191 |
+
<data key="e_suspicion_score">0.25</data>
|
| 192 |
+
<data key="e_mo_name">Data Theft</data>
|
| 193 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 194 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 195 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 196 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 197 |
+
<data key="e_disposition">Unprocessed</data>
|
| 198 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 199 |
+
</edge>
|
| 200 |
+
<edge id="e9" source="HOST-11932" target="HOST-11424">
|
| 201 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 202 |
+
<data key="e_timestamp">1695745632</data>
|
| 203 |
+
<data key="e_label_binary">malicious</data>
|
| 204 |
+
<data key="e_label_confidence">0.7</data>
|
| 205 |
+
<data key="e_suspicion_score">0.25</data>
|
| 206 |
+
<data key="e_mo_name">Data Theft</data>
|
| 207 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 208 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 209 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 210 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 211 |
+
<data key="e_disposition">Unprocessed</data>
|
| 212 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 213 |
+
</edge>
|
| 214 |
+
<edge id="e10" source="HOST-11424" target="HOST-11932">
|
| 215 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 216 |
+
<data key="e_timestamp">1695745632</data>
|
| 217 |
+
<data key="e_label_binary">malicious</data>
|
| 218 |
+
<data key="e_label_confidence">0.7</data>
|
| 219 |
+
<data key="e_suspicion_score">0.25</data>
|
| 220 |
+
<data key="e_mo_name">Data Theft</data>
|
| 221 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 222 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 223 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 224 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 225 |
+
<data key="e_disposition">Unprocessed</data>
|
| 226 |
+
<data key="e_incident_id">8c0b74a0-5c89-11ee-8e0e-93298c809ccb</data>
|
| 227 |
+
</edge>
|
| 228 |
+
</graph>
|
| 229 |
+
</graphml>
|
graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.26.23.117</data>
|
| 35 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="89cbc042-0b68-11ee-a07a-cfa6a9a5db76">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.17.184</data>
|
| 43 |
+
<data key="n_hostname">100.64.17.184</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2824" target="HOST-4164">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697862192</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c0d8530-6fc9-11ee-9ae8-5ba4cc946389</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml
ADDED
|
@@ -0,0 +1,453 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.33.209</data>
|
| 35 |
+
<data key="n_hostname">100.64.33.209</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3ef81652-c823-11ed-a57f-1bec2f3cbc08">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="2ab35972-facd-11ed-af2b-e36b5e3a502a">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.52.54</data>
|
| 51 |
+
<data key="n_hostname">100.64.52.54</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b64ce795-c822-11ed-93e7-73b4f1774f3f">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.24.191.229</data>
|
| 59 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="0276e3f5-c823-11ed-b38f-718276329dbf">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.30.201.119</data>
|
| 67 |
+
<data key="n_hostname">172.30.201.119</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="72089dc1-c8b0-11ed-9030-3fa9190e58fd">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.7.51</data>
|
| 75 |
+
<data key="n_hostname">100.64.7.51</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="7c09cdd0-d4e5-11ed-a892-356a46f3380b">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.52.55</data>
|
| 83 |
+
<data key="n_hostname">100.64.52.55</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="2a54f688-dfd6-11ed-a9d2-33e615983ea6">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.52.56</data>
|
| 91 |
+
<data key="n_hostname">100.64.52.56</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="00e11071-d452-11ed-b2f2-7be480500b36">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.52.57</data>
|
| 99 |
+
<data key="n_hostname">100.64.52.57</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="c542afd1-c8d3-11ed-a461-7bea8ba11e3a">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.17.248</data>
|
| 107 |
+
<data key="n_hostname">100.64.17.248</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="8643ce10-c8e5-11ed-a762-7be9f55697fc">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.47.17</data>
|
| 115 |
+
<data key="n_hostname">100.64.47.17</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.37.114</data>
|
| 123 |
+
<data key="n_hostname">100.64.37.114</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="e2f44224-c854-11ed-9afd-73eabb06d50a">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.21.90</data>
|
| 131 |
+
<data key="n_hostname">100.64.21.90</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="74ce6333-c85d-11ed-b057-f539ce14258e">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.19.191</data>
|
| 139 |
+
<data key="n_hostname">100.64.19.191</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<edge id="e1" source="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3" target="HOST-4069">
|
| 145 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 146 |
+
<data key="e_timestamp">1684999624</data>
|
| 147 |
+
<data key="e_label_binary">malicious</data>
|
| 148 |
+
<data key="e_label_confidence">0.7</data>
|
| 149 |
+
<data key="e_suspicion_score">0.25</data>
|
| 150 |
+
<data key="e_mo_name">Data Theft</data>
|
| 151 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 152 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 153 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 154 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 155 |
+
<data key="e_disposition">Unprocessed</data>
|
| 156 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 157 |
+
</edge>
|
| 158 |
+
<edge id="e2" source="2ab35972-facd-11ed-af2b-e36b5e3a502a" target="HOST-3655">
|
| 159 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 160 |
+
<data key="e_timestamp">1684999624</data>
|
| 161 |
+
<data key="e_label_binary">malicious</data>
|
| 162 |
+
<data key="e_label_confidence">0.7</data>
|
| 163 |
+
<data key="e_suspicion_score">0.25</data>
|
| 164 |
+
<data key="e_mo_name">Data Theft</data>
|
| 165 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 166 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 167 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 168 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 169 |
+
<data key="e_disposition">Unprocessed</data>
|
| 170 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 171 |
+
</edge>
|
| 172 |
+
<edge id="e3" source="HOST-3655" target="2ab35972-facd-11ed-af2b-e36b5e3a502a">
|
| 173 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 174 |
+
<data key="e_timestamp">1684999624</data>
|
| 175 |
+
<data key="e_label_binary">malicious</data>
|
| 176 |
+
<data key="e_label_confidence">0.7</data>
|
| 177 |
+
<data key="e_suspicion_score">0.25</data>
|
| 178 |
+
<data key="e_mo_name">Data Theft</data>
|
| 179 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 180 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 181 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 182 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 183 |
+
<data key="e_disposition">Unprocessed</data>
|
| 184 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 185 |
+
</edge>
|
| 186 |
+
<edge id="e4" source="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3" target="HOST-3655">
|
| 187 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 188 |
+
<data key="e_timestamp">1684999624</data>
|
| 189 |
+
<data key="e_label_binary">malicious</data>
|
| 190 |
+
<data key="e_label_confidence">0.7</data>
|
| 191 |
+
<data key="e_suspicion_score">0.25</data>
|
| 192 |
+
<data key="e_mo_name">Data Theft</data>
|
| 193 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 194 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 195 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 196 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 197 |
+
<data key="e_disposition">Unprocessed</data>
|
| 198 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 199 |
+
</edge>
|
| 200 |
+
<edge id="e5" source="HOST-3655" target="5efdf610-f8be-11ed-ab80-1b4ce5bda4a3">
|
| 201 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 202 |
+
<data key="e_timestamp">1684999624</data>
|
| 203 |
+
<data key="e_label_binary">malicious</data>
|
| 204 |
+
<data key="e_label_confidence">0.7</data>
|
| 205 |
+
<data key="e_suspicion_score">0.25</data>
|
| 206 |
+
<data key="e_mo_name">Data Theft</data>
|
| 207 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 208 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 209 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 210 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 211 |
+
<data key="e_disposition">Unprocessed</data>
|
| 212 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 213 |
+
</edge>
|
| 214 |
+
<edge id="e6" source="HOST-4054" target="HOST-4060">
|
| 215 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 216 |
+
<data key="e_timestamp">1684999624</data>
|
| 217 |
+
<data key="e_label_binary">malicious</data>
|
| 218 |
+
<data key="e_label_confidence">0.7</data>
|
| 219 |
+
<data key="e_suspicion_score">0.25</data>
|
| 220 |
+
<data key="e_mo_name">Data Theft</data>
|
| 221 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 222 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 223 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 224 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 225 |
+
<data key="e_disposition">Unprocessed</data>
|
| 226 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 227 |
+
</edge>
|
| 228 |
+
<edge id="e7" source="HOST-4060" target="HOST-4054">
|
| 229 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 230 |
+
<data key="e_timestamp">1684999624</data>
|
| 231 |
+
<data key="e_label_binary">malicious</data>
|
| 232 |
+
<data key="e_label_confidence">0.7</data>
|
| 233 |
+
<data key="e_suspicion_score">0.25</data>
|
| 234 |
+
<data key="e_mo_name">Data Theft</data>
|
| 235 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 236 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 237 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 238 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 239 |
+
<data key="e_disposition">Unprocessed</data>
|
| 240 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 241 |
+
</edge>
|
| 242 |
+
<edge id="e8" source="HOST-4054" target="7c09cdd0-d4e5-11ed-a892-356a46f3380b">
|
| 243 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 244 |
+
<data key="e_timestamp">1684999624</data>
|
| 245 |
+
<data key="e_label_binary">malicious</data>
|
| 246 |
+
<data key="e_label_confidence">0.7</data>
|
| 247 |
+
<data key="e_suspicion_score">0.25</data>
|
| 248 |
+
<data key="e_mo_name">Data Theft</data>
|
| 249 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 250 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 251 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 252 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 253 |
+
<data key="e_disposition">Unprocessed</data>
|
| 254 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 255 |
+
</edge>
|
| 256 |
+
<edge id="e9" source="7c09cdd0-d4e5-11ed-a892-356a46f3380b" target="HOST-4054">
|
| 257 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 258 |
+
<data key="e_timestamp">1684999624</data>
|
| 259 |
+
<data key="e_label_binary">malicious</data>
|
| 260 |
+
<data key="e_label_confidence">0.7</data>
|
| 261 |
+
<data key="e_suspicion_score">0.25</data>
|
| 262 |
+
<data key="e_mo_name">Data Theft</data>
|
| 263 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 264 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 265 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 266 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 267 |
+
<data key="e_disposition">Unprocessed</data>
|
| 268 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 269 |
+
</edge>
|
| 270 |
+
<edge id="e10" source="2a54f688-dfd6-11ed-a9d2-33e615983ea6" target="HOST-4054">
|
| 271 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 272 |
+
<data key="e_timestamp">1684999624</data>
|
| 273 |
+
<data key="e_label_binary">malicious</data>
|
| 274 |
+
<data key="e_label_confidence">0.7</data>
|
| 275 |
+
<data key="e_suspicion_score">0.25</data>
|
| 276 |
+
<data key="e_mo_name">Data Theft</data>
|
| 277 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 278 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 279 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 280 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 281 |
+
<data key="e_disposition">Unprocessed</data>
|
| 282 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 283 |
+
</edge>
|
| 284 |
+
<edge id="e11" source="HOST-4054" target="2a54f688-dfd6-11ed-a9d2-33e615983ea6">
|
| 285 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 286 |
+
<data key="e_timestamp">1684999624</data>
|
| 287 |
+
<data key="e_label_binary">malicious</data>
|
| 288 |
+
<data key="e_label_confidence">0.7</data>
|
| 289 |
+
<data key="e_suspicion_score">0.25</data>
|
| 290 |
+
<data key="e_mo_name">Data Theft</data>
|
| 291 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 292 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 293 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 294 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 295 |
+
<data key="e_disposition">Unprocessed</data>
|
| 296 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 297 |
+
</edge>
|
| 298 |
+
<edge id="e12" source="HOST-4054" target="00e11071-d452-11ed-b2f2-7be480500b36">
|
| 299 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 300 |
+
<data key="e_timestamp">1684999624</data>
|
| 301 |
+
<data key="e_label_binary">malicious</data>
|
| 302 |
+
<data key="e_label_confidence">0.7</data>
|
| 303 |
+
<data key="e_suspicion_score">0.25</data>
|
| 304 |
+
<data key="e_mo_name">Data Theft</data>
|
| 305 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 306 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 307 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 308 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 309 |
+
<data key="e_disposition">Unprocessed</data>
|
| 310 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 311 |
+
</edge>
|
| 312 |
+
<edge id="e13" source="HOST-4054" target="c542afd1-c8d3-11ed-a461-7bea8ba11e3a">
|
| 313 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 314 |
+
<data key="e_timestamp">1684999624</data>
|
| 315 |
+
<data key="e_label_binary">malicious</data>
|
| 316 |
+
<data key="e_label_confidence">0.7</data>
|
| 317 |
+
<data key="e_suspicion_score">0.25</data>
|
| 318 |
+
<data key="e_mo_name">Data Theft</data>
|
| 319 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 320 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 321 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 322 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 323 |
+
<data key="e_disposition">Unprocessed</data>
|
| 324 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 325 |
+
</edge>
|
| 326 |
+
<edge id="e14" source="c542afd1-c8d3-11ed-a461-7bea8ba11e3a" target="HOST-4054">
|
| 327 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 328 |
+
<data key="e_timestamp">1684999624</data>
|
| 329 |
+
<data key="e_label_binary">malicious</data>
|
| 330 |
+
<data key="e_label_confidence">0.7</data>
|
| 331 |
+
<data key="e_suspicion_score">0.25</data>
|
| 332 |
+
<data key="e_mo_name">Data Theft</data>
|
| 333 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 334 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 335 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 336 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 337 |
+
<data key="e_disposition">Unprocessed</data>
|
| 338 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 339 |
+
</edge>
|
| 340 |
+
<edge id="e15" source="8643ce10-c8e5-11ed-a762-7be9f55697fc" target="HOST-4054">
|
| 341 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 342 |
+
<data key="e_timestamp">1684999624</data>
|
| 343 |
+
<data key="e_label_binary">malicious</data>
|
| 344 |
+
<data key="e_label_confidence">0.7</data>
|
| 345 |
+
<data key="e_suspicion_score">0.25</data>
|
| 346 |
+
<data key="e_mo_name">Data Theft</data>
|
| 347 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 348 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 349 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 350 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 351 |
+
<data key="e_disposition">Unprocessed</data>
|
| 352 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 353 |
+
</edge>
|
| 354 |
+
<edge id="e16" source="HOST-4054" target="8643ce10-c8e5-11ed-a762-7be9f55697fc">
|
| 355 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 356 |
+
<data key="e_timestamp">1684999624</data>
|
| 357 |
+
<data key="e_label_binary">malicious</data>
|
| 358 |
+
<data key="e_label_confidence">0.7</data>
|
| 359 |
+
<data key="e_suspicion_score">0.25</data>
|
| 360 |
+
<data key="e_mo_name">Data Theft</data>
|
| 361 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 362 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 363 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 364 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 365 |
+
<data key="e_disposition">Unprocessed</data>
|
| 366 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 367 |
+
</edge>
|
| 368 |
+
<edge id="e17" source="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b" target="HOST-4054">
|
| 369 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 370 |
+
<data key="e_timestamp">1684999624</data>
|
| 371 |
+
<data key="e_label_binary">malicious</data>
|
| 372 |
+
<data key="e_label_confidence">0.7</data>
|
| 373 |
+
<data key="e_suspicion_score">0.25</data>
|
| 374 |
+
<data key="e_mo_name">Data Theft</data>
|
| 375 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 376 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 377 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 378 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 379 |
+
<data key="e_disposition">Unprocessed</data>
|
| 380 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 381 |
+
</edge>
|
| 382 |
+
<edge id="e18" source="HOST-4054" target="0775eea0-dfd9-11ed-b7af-1f7bbb6d4a4b">
|
| 383 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 384 |
+
<data key="e_timestamp">1684999624</data>
|
| 385 |
+
<data key="e_label_binary">malicious</data>
|
| 386 |
+
<data key="e_label_confidence">0.7</data>
|
| 387 |
+
<data key="e_suspicion_score">0.25</data>
|
| 388 |
+
<data key="e_mo_name">Data Theft</data>
|
| 389 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 390 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 391 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 392 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 393 |
+
<data key="e_disposition">Unprocessed</data>
|
| 394 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 395 |
+
</edge>
|
| 396 |
+
<edge id="e19" source="e2f44224-c854-11ed-9afd-73eabb06d50a" target="HOST-4054">
|
| 397 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 398 |
+
<data key="e_timestamp">1684999624</data>
|
| 399 |
+
<data key="e_label_binary">malicious</data>
|
| 400 |
+
<data key="e_label_confidence">0.7</data>
|
| 401 |
+
<data key="e_suspicion_score">0.25</data>
|
| 402 |
+
<data key="e_mo_name">Data Theft</data>
|
| 403 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 404 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 405 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 406 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 407 |
+
<data key="e_disposition">Unprocessed</data>
|
| 408 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 409 |
+
</edge>
|
| 410 |
+
<edge id="e20" source="HOST-4054" target="e2f44224-c854-11ed-9afd-73eabb06d50a">
|
| 411 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 412 |
+
<data key="e_timestamp">1684999624</data>
|
| 413 |
+
<data key="e_label_binary">malicious</data>
|
| 414 |
+
<data key="e_label_confidence">0.7</data>
|
| 415 |
+
<data key="e_suspicion_score">0.25</data>
|
| 416 |
+
<data key="e_mo_name">Data Theft</data>
|
| 417 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 418 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 419 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 420 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 421 |
+
<data key="e_disposition">Unprocessed</data>
|
| 422 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 423 |
+
</edge>
|
| 424 |
+
<edge id="e21" source="HOST-7434" target="HOST-4054">
|
| 425 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 426 |
+
<data key="e_timestamp">1684999624</data>
|
| 427 |
+
<data key="e_label_binary">malicious</data>
|
| 428 |
+
<data key="e_label_confidence">0.7</data>
|
| 429 |
+
<data key="e_suspicion_score">0.25</data>
|
| 430 |
+
<data key="e_mo_name">Data Theft</data>
|
| 431 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 432 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 433 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 434 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 435 |
+
<data key="e_disposition">Unprocessed</data>
|
| 436 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 437 |
+
</edge>
|
| 438 |
+
<edge id="e22" source="HOST-4054" target="HOST-7434">
|
| 439 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 440 |
+
<data key="e_timestamp">1684999624</data>
|
| 441 |
+
<data key="e_label_binary">malicious</data>
|
| 442 |
+
<data key="e_label_confidence">0.7</data>
|
| 443 |
+
<data key="e_suspicion_score">0.25</data>
|
| 444 |
+
<data key="e_mo_name">Data Theft</data>
|
| 445 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 446 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 447 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 448 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 449 |
+
<data key="e_disposition">Unprocessed</data>
|
| 450 |
+
<data key="e_incident_id">8c18f940-facd-11ed-92e9-edc32a467d1f</data>
|
| 451 |
+
</edge>
|
| 452 |
+
</graph>
|
| 453 |
+
</graphml>
|
graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.29.158.1</data>
|
| 35 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="32c98c60-4fd2-11ee-93eb-5f6ed73039b3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.17.146</data>
|
| 43 |
+
<data key="n_hostname">100.64.17.146</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2858" target="HOST-4143">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713787931</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c1a1930-00a1-11ef-b5c2-73222c3b09d8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1fc70140-3aa3-11ee-8dff-774bbc647368">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.22.245.248</data>
|
| 35 |
+
<data key="n_hostname">172.22.245.248</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1be59f35-2277-11ee-83ae-23da186903eb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.89</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.89</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="ddee3c43-3569-11ee-be1e-fbdbc7e8556d">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.16.46.208</data>
|
| 51 |
+
<data key="n_hostname">172.16.46.208</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-17148" target="1be59f35-2277-11ee-83ae-23da186903eb">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1716105495</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 61 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="1be59f35-2277-11ee-83ae-23da186903eb" target="HOST-17148">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1716105495</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 75 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="HOST-17290" target="1be59f35-2277-11ee-83ae-23da186903eb">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1716105495</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 89 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="1be59f35-2277-11ee-83ae-23da186903eb" target="HOST-17290">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1716105495</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 103 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">8c23e040-15b5-11ef-8b2e-b54e20f7e466</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cd2bfff1-062a-11ee-ad3e-fda0da874cab">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.18.40</data>
|
| 43 |
+
<data key="n_hostname">100.64.18.40</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="HOST-4215">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830409</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml
ADDED
|
@@ -0,0 +1,401 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a0a78300-385d-11ed-b51a-91270307622b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.144.247.94</data>
|
| 35 |
+
<data key="n_hostname">10.144.247.94</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="aa80dfc1-114d-11ed-8ade-d96fa08858d6">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.87.158</data>
|
| 43 |
+
<data key="n_hostname">100.64.87.158</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="6b044351-4203-11ed-972e-2bf3955d2910">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.87.159</data>
|
| 51 |
+
<data key="n_hostname">100.64.87.159</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="308970c1-406d-11ed-8328-1f79238d2dca">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.87.160</data>
|
| 59 |
+
<data key="n_hostname">100.64.87.160</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="ddec37ca-4527-11ed-bfba-b39d81f9969b">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.87.161</data>
|
| 67 |
+
<data key="n_hostname">100.64.87.161</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="f32b3b81-545a-11ed-a527-31b36cda0462">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.87.162</data>
|
| 75 |
+
<data key="n_hostname">100.64.87.162</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="50e3caa2-447d-11ed-b91d-59bda05d7bd0">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.87.163</data>
|
| 83 |
+
<data key="n_hostname">100.64.87.163</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="34b1a244-4bd4-11ed-b29a-3b7996557de6">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.87.164</data>
|
| 91 |
+
<data key="n_hostname">100.64.87.164</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="879a7355-1b60-11ed-849b-49f568a41256">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.87.165</data>
|
| 99 |
+
<data key="n_hostname">100.64.87.165</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="754ae744-3ed6-11ed-9a4f-99eb230f3e06">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.87.166</data>
|
| 107 |
+
<data key="n_hostname">100.64.87.166</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="60068492-4555-11ed-841a-633bb6ef8f03">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.87.167</data>
|
| 115 |
+
<data key="n_hostname">100.64.87.167</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="a0a78300-385d-11ed-b51a-91270307622b" target="aa80dfc1-114d-11ed-8ade-d96fa08858d6">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1672372420</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 125 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="aa80dfc1-114d-11ed-8ade-d96fa08858d6" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1672372420</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 139 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="a0a78300-385d-11ed-b51a-91270307622b" target="6b044351-4203-11ed-972e-2bf3955d2910">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1672372420</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 153 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Disrupted</data>
|
| 160 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="6b044351-4203-11ed-972e-2bf3955d2910" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1672372420</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 167 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Disrupted</data>
|
| 174 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="a0a78300-385d-11ed-b51a-91270307622b" target="308970c1-406d-11ed-8328-1f79238d2dca">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1672372420</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 181 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Disrupted</data>
|
| 188 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="308970c1-406d-11ed-8328-1f79238d2dca" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1672372420</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 195 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Disrupted</data>
|
| 202 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="a0a78300-385d-11ed-b51a-91270307622b" target="ddec37ca-4527-11ed-bfba-b39d81f9969b">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1672372420</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 209 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Disrupted</data>
|
| 216 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="ddec37ca-4527-11ed-bfba-b39d81f9969b" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1672372420</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 223 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Disrupted</data>
|
| 230 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="a0a78300-385d-11ed-b51a-91270307622b" target="f32b3b81-545a-11ed-a527-31b36cda0462">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1672372420</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 237 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Disrupted</data>
|
| 244 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="f32b3b81-545a-11ed-a527-31b36cda0462" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1672372420</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 251 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Disrupted</data>
|
| 258 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="a0a78300-385d-11ed-b51a-91270307622b" target="50e3caa2-447d-11ed-b91d-59bda05d7bd0">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1672372420</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 265 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Disrupted</data>
|
| 272 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="50e3caa2-447d-11ed-b91d-59bda05d7bd0" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1672372420</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 279 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Disrupted</data>
|
| 286 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="a0a78300-385d-11ed-b51a-91270307622b" target="34b1a244-4bd4-11ed-b29a-3b7996557de6">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1672372420</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 293 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Disrupted</data>
|
| 300 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="34b1a244-4bd4-11ed-b29a-3b7996557de6" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1672372420</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 307 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Disrupted</data>
|
| 314 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="a0a78300-385d-11ed-b51a-91270307622b" target="879a7355-1b60-11ed-849b-49f568a41256">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1672372420</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 321 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Disrupted</data>
|
| 328 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="879a7355-1b60-11ed-849b-49f568a41256" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1672372420</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 335 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Disrupted</data>
|
| 342 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="a0a78300-385d-11ed-b51a-91270307622b" target="754ae744-3ed6-11ed-9a4f-99eb230f3e06">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1672372420</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 349 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Disrupted</data>
|
| 356 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="754ae744-3ed6-11ed-9a4f-99eb230f3e06" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1672372420</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 363 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Disrupted</data>
|
| 370 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="a0a78300-385d-11ed-b51a-91270307622b" target="60068492-4555-11ed-841a-633bb6ef8f03">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1672372420</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 377 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Disrupted</data>
|
| 384 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 385 |
+
</edge>
|
| 386 |
+
<edge id="e20" source="60068492-4555-11ed-841a-633bb6ef8f03" target="a0a78300-385d-11ed-b51a-91270307622b">
|
| 387 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 388 |
+
<data key="e_timestamp">1672372420</data>
|
| 389 |
+
<data key="e_label_binary">malicious</data>
|
| 390 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 391 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 392 |
+
<data key="e_mo_name">Data Theft</data>
|
| 393 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 394 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 395 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 396 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 397 |
+
<data key="e_disposition">Disrupted</data>
|
| 398 |
+
<data key="e_incident_id">8c4ac100-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 399 |
+
</edge>
|
| 400 |
+
</graph>
|
| 401 |
+
</graphml>
|
graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c2b97d30-063a-11ee-93e5-c7d42ca5d975">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.83.16</data>
|
| 35 |
+
<data key="n_hostname">192.168.83.16</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="14cb17d3-063d-11ee-8fd2-af3b08029a6c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.150</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.150</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="c2b97d30-063a-11ee-93e5-c7d42ca5d975" target="14cb17d3-063d-11ee-8fd2-af3b08029a6c">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1687961434</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c4ad220-15bd-11ee-aa1e-3bafa1120b8e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="14cb17d3-063d-11ee-8fd2-af3b08029a6c" target="c2b97d30-063a-11ee-93e5-c7d42ca5d975">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1687961434</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">8c4ad220-15bd-11ee-aa1e-3bafa1120b8e</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b40b8970-a11a-11ed-a9e3-3b1569489d4f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.83.147</data>
|
| 35 |
+
<data key="n_hostname">100.64.83.147</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","AWS VPC Security"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="0821f824-afec-11ed-84ee-5b0955f99b30">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.7.65.131</data>
|
| 43 |
+
<data key="n_hostname">10.7.65.131</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","AWS VPC Security"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b40b8970-a11a-11ed-a9e3-3b1569489d4f" target="HOST-16804">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1676901034</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c4e9560-b125-11ed-8c7d-65e7f37a4d8d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0821f824-afec-11ed-84ee-5b0955f99b30">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.7.65.131</data>
|
| 35 |
+
<data key="n_hostname">10.7.65.131</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","AWS VPC Security"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b40b8970-a11a-11ed-a9e3-3b1569489d4f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.83.147</data>
|
| 43 |
+
<data key="n_hostname">100.64.83.147</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","AWS VPC Security"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16804" target="HOST-16824">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1676901034</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c532940-b125-11ed-8c7d-65e7f37a4d8d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.21.61.66</data>
|
| 35 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d79ff340-3633-11ee-b278-ef7c94a0d649">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.54.69</data>
|
| 43 |
+
<data key="n_hostname">100.64.54.69</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2709" target="d79ff340-3633-11ee-b278-ef7c94a0d649">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1694888357</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="42343963-6037-11ed-b1e8-d15b4101abb9">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.87.178</data>
|
| 35 |
+
<data key="n_hostname">100.64.87.178</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="8f93e362-46cc-11ed-9451-934337ed080b">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">10.221.82.8</data>
|
| 51 |
+
<data key="n_hostname">USER-0015-1965.example.internal</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="42343963-6037-11ed-b1e8-d15b4101abb9" target="HOST-16881">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1672372420</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.25</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Unprocessed</data>
|
| 68 |
+
<data key="e_incident_id">8c55e490-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="42343963-6037-11ed-b1e8-d15b4101abb9" target="HOST-16882">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1672372420</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.25</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Unprocessed</data>
|
| 82 |
+
<data key="e_incident_id">8c55e490-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 83 |
+
</edge>
|
| 84 |
+
</graph>
|
| 85 |
+
</graphml>
|
graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.113.78.104</data>
|
| 35 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="42343963-6037-11ed-b1e8-d15b4101abb9">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.87.178</data>
|
| 43 |
+
<data key="n_hostname">100.64.87.178</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16881" target="HOST-17417">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1672372420</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c5aeda0-87f5-11ed-9f01-ef8ef15959cb</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1541e592-0629-11ee-b144-2b760827f5b0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.21.149</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1235.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="1a05ba61-0846-11ee-af77-077611088c91">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.60.147</data>
|
| 51 |
+
<data key="n_hostname">100.64.60.147</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-4845" target="HOST-2839">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1687494141</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 61 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-2839" target="HOST-4845">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1687494141</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 75 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="1a05ba61-0846-11ee-af77-077611088c91" target="HOST-2839">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1687494141</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 89 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-2839" target="1a05ba61-0846-11ee-af77-077611088c91">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1687494141</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 103 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">8c5be180-117d-11ee-b107-2764325d5a51</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="06b655f0-062a-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.48.229</data>
|
| 35 |
+
<data key="n_hostname">100.64.48.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.174.172</data>
|
| 43 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-8550" target="HOST-2946">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686427701</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c5da680-07ca-11ee-9239-4117e3175884</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.101.1</data>
|
| 35 |
+
<data key="n_hostname">172.31.101.1</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="eae6b130-0633-11ee-99c3-7bb8d56365b4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.31.163</data>
|
| 43 |
+
<data key="n_hostname">100.64.31.163</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2821" target="HOST-6097">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830410</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml
ADDED
|
@@ -0,0 +1,387 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="72d36778-475a-11ee-be27-eb255d733dd4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.34.190</data>
|
| 35 |
+
<data key="n_hostname">100.64.34.190</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.27.202.53</data>
|
| 43 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.9208984375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="d2c67860-3fef-11ee-bbba-d5415b45e911">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.54.198</data>
|
| 51 |
+
<data key="n_hostname">100.64.54.198</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="e06a5a92-18f3-11ee-ad5c-f9e88d6f3f2c">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.34.45</data>
|
| 59 |
+
<data key="n_hostname">100.64.34.45</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="6cbbb930-21a0-11ee-95b9-ad7eec260002">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.54.199</data>
|
| 67 |
+
<data key="n_hostname">100.64.54.199</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="29d51733-062d-11ee-b5c2-b5abc8284c6f">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.27.235</data>
|
| 75 |
+
<data key="n_hostname">100.64.27.235</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="751f9011-2e9d-11ee-a165-e1fd635cc763">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.54.200</data>
|
| 83 |
+
<data key="n_hostname">100.64.54.200</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="9c419952-064c-11ee-9144-232135dd7d16">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.51.202</data>
|
| 91 |
+
<data key="n_hostname">100.64.51.202</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="c2e32da1-062c-11ee-85b9-c1d3d8d0c43c">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.20.210</data>
|
| 99 |
+
<data key="n_hostname">100.64.20.210</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="5d6530d4-669f-11ee-b79c-19726371883f">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.54.201</data>
|
| 107 |
+
<data key="n_hostname">100.64.54.201</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="cdf30832-0624-11ee-9a87-6114210b307b">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.46.236</data>
|
| 115 |
+
<data key="n_hostname">100.64.46.236</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="HOST-7911" target="HOST-2703">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1697599341</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 125 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-2703" target="HOST-7911">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1697599341</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 139 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="d2c67860-3fef-11ee-bbba-d5415b45e911" target="HOST-2703">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1697599341</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 153 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Disrupted</data>
|
| 160 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="HOST-2703" target="d2c67860-3fef-11ee-bbba-d5415b45e911">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1697599341</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 167 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Disrupted</data>
|
| 174 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="HOST-6427" target="HOST-2703">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1697599341</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 181 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Disrupted</data>
|
| 188 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-2703" target="HOST-6427">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1697599341</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 195 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Disrupted</data>
|
| 202 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="6cbbb930-21a0-11ee-95b9-ad7eec260002" target="HOST-2703">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1697599341</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 209 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Disrupted</data>
|
| 216 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="HOST-2703" target="6cbbb930-21a0-11ee-95b9-ad7eec260002">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1697599341</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 223 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Disrupted</data>
|
| 230 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="HOST-7349" target="HOST-2703">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1697599341</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 237 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Disrupted</data>
|
| 244 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="HOST-2703" target="HOST-7349">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1697599341</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 251 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Disrupted</data>
|
| 258 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="751f9011-2e9d-11ee-a165-e1fd635cc763" target="HOST-2703">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1697599341</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 265 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Disrupted</data>
|
| 272 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-2703" target="751f9011-2e9d-11ee-a165-e1fd635cc763">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1697599341</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 279 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Disrupted</data>
|
| 286 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="HOST-8963" target="HOST-2703">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1697599341</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 293 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Disrupted</data>
|
| 300 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-2703" target="HOST-8963">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1697599341</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 307 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Disrupted</data>
|
| 314 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="HOST-4570" target="HOST-2703">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1697599341</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 321 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Disrupted</data>
|
| 328 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-2703" target="HOST-4570">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1697599341</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 335 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Disrupted</data>
|
| 342 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="5d6530d4-669f-11ee-b79c-19726371883f" target="HOST-2703">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1697599341</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 349 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Disrupted</data>
|
| 356 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="HOST-2703" target="5d6530d4-669f-11ee-b79c-19726371883f">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1697599341</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 363 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Disrupted</data>
|
| 370 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="HOST-2703" target="HOST-8267">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1697599341</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 377 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Disrupted</data>
|
| 384 |
+
<data key="e_incident_id">8c677920-6d65-11ee-9911-f50eb88c1287</data>
|
| 385 |
+
</edge>
|
| 386 |
+
</graph>
|
| 387 |
+
</graphml>
|
graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd33551-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.23.86.34</data>
|
| 35 |
+
<data key="n_hostname">172.23.86.34</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a63c87d0-064c-11ee-abbb-3f6268c49351">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.11.42</data>
|
| 43 |
+
<data key="n_hostname">100.64.11.42</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2717" target="HOST-3269">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830410</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5a9ec460-0795-11ee-ad7f-0117287bd13d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.15.156</data>
|
| 35 |
+
<data key="n_hostname">100.64.15.156</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3871" target="HOST-2750">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1694888357</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c793590-54bd-11ee-8e2f-e12aa4f0d6f4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="939e9981-0627-11ee-8860-f951c26910c1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.12.25</data>
|
| 35 |
+
<data key="n_hostname">100.64.12.25</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.200.243</data>
|
| 43 |
+
<data key="n_hostname">172.30.200.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">10.135.251.191</data>
|
| 51 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.31.11.166</data>
|
| 59 |
+
<data key="n_hostname">172.31.11.166</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="HOST-3373" target="HOST-2706">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1697352810</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.7</data>
|
| 69 |
+
<data key="e_suspicion_score">0.25</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Unprocessed</data>
|
| 76 |
+
<data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-3373" target="HOST-2751">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1697352810</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.7</data>
|
| 83 |
+
<data key="e_suspicion_score">0.25</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Unprocessed</data>
|
| 90 |
+
<data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="HOST-3373" target="HOST-2711">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1697352810</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.7</data>
|
| 97 |
+
<data key="e_suspicion_score">0.25</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Unprocessed</data>
|
| 104 |
+
<data key="e_incident_id">8c7a83c0-6b27-11ee-bff6-eb2f5319dd87</data>
|
| 105 |
+
</edge>
|
| 106 |
+
</graph>
|
| 107 |
+
</graphml>
|
graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a63c87d0-064c-11ee-abbb-3f6268c49351">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.11.42</data>
|
| 35 |
+
<data key="n_hostname">100.64.11.42</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd33551-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.23.86.34</data>
|
| 43 |
+
<data key="n_hostname">172.23.86.34</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3269" target="HOST-2717">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830410</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.174.172</data>
|
| 35 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="06b655f0-062a-11ee-b404-ff2ea490fc35">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.48.229</data>
|
| 43 |
+
<data key="n_hostname">100.64.48.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2946" target="HOST-8550">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686427701</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c83cc20-07ca-11ee-9239-4117e3175884</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.229.11</data>
|
| 35 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5a9ec460-0795-11ee-ad7f-0117287bd13d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.15.156</data>
|
| 43 |
+
<data key="n_hostname">100.64.15.156</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2750" target="HOST-3871">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1694888357</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.221.82.8</data>
|
| 35 |
+
<data key="n_hostname">100.64.6.199</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a29c2db2-0e9e-11ee-917c-63d93d021290">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.19.192</data>
|
| 43 |
+
<data key="n_hostname">100.64.19.192</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17001" target="a29c2db2-0e9e-11ee-917c-63d93d021290">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714616001</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8c9ceab0-0829-11ef-9432-0316676438e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e08bce80-3a1f-11ee-804e-7bda33583aba">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.49.202</data>
|
| 35 |
+
<data key="n_hostname">100.64.49.202</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.174.172</data>
|
| 43 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="e08bce80-3a1f-11ee-804e-7bda33583aba" target="HOST-2946">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830410</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml
ADDED
|
@@ -0,0 +1,221 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="11b2c2b4-079a-11ee-a602-0181fec44f3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.53.107</data>
|
| 35 |
+
<data key="n_hostname">100.64.53.107</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="4c3f35e0-119e-11ee-bc47-d1754d41a953">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.10.168</data>
|
| 51 |
+
<data key="n_hostname">100.64.10.168</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b70574c1-0681-11ee-b53a-5d6415135f30">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.53.108</data>
|
| 59 |
+
<data key="n_hostname">100.64.53.108</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="9a6a1a00-0627-11ee-b19f-ed665a42340f">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.24.62</data>
|
| 67 |
+
<data key="n_hostname">100.64.24.62</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="3770a660-6443-11ee-a136-af2d82818db7">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.53.109</data>
|
| 75 |
+
<data key="n_hostname">100.64.53.109</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<edge id="e1" source="11b2c2b4-079a-11ee-a602-0181fec44f3c" target="HOST-2858">
|
| 81 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 82 |
+
<data key="e_timestamp">1703211575</data>
|
| 83 |
+
<data key="e_label_binary">malicious</data>
|
| 84 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 85 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 86 |
+
<data key="e_mo_name">Data Theft</data>
|
| 87 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 88 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 89 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 90 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 91 |
+
<data key="e_disposition">Disrupted</data>
|
| 92 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 93 |
+
</edge>
|
| 94 |
+
<edge id="e2" source="HOST-2858" target="11b2c2b4-079a-11ee-a602-0181fec44f3c">
|
| 95 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 96 |
+
<data key="e_timestamp">1703211575</data>
|
| 97 |
+
<data key="e_label_binary">malicious</data>
|
| 98 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 99 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 100 |
+
<data key="e_mo_name">Data Theft</data>
|
| 101 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 102 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 103 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 104 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 105 |
+
<data key="e_disposition">Disrupted</data>
|
| 106 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 107 |
+
</edge>
|
| 108 |
+
<edge id="e3" source="HOST-3194" target="HOST-2858">
|
| 109 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 110 |
+
<data key="e_timestamp">1703211575</data>
|
| 111 |
+
<data key="e_label_binary">malicious</data>
|
| 112 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 113 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 114 |
+
<data key="e_mo_name">Data Theft</data>
|
| 115 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 116 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 117 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 118 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 119 |
+
<data key="e_disposition">Disrupted</data>
|
| 120 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 121 |
+
</edge>
|
| 122 |
+
<edge id="e4" source="HOST-2858" target="HOST-3194">
|
| 123 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 124 |
+
<data key="e_timestamp">1703211575</data>
|
| 125 |
+
<data key="e_label_binary">malicious</data>
|
| 126 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 127 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 128 |
+
<data key="e_mo_name">Data Theft</data>
|
| 129 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 130 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 131 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 132 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 133 |
+
<data key="e_disposition">Disrupted</data>
|
| 134 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 135 |
+
</edge>
|
| 136 |
+
<edge id="e5" source="b70574c1-0681-11ee-b53a-5d6415135f30" target="HOST-2858">
|
| 137 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 138 |
+
<data key="e_timestamp">1703211575</data>
|
| 139 |
+
<data key="e_label_binary">malicious</data>
|
| 140 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 141 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 142 |
+
<data key="e_mo_name">Data Theft</data>
|
| 143 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 144 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 145 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 146 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 147 |
+
<data key="e_disposition">Disrupted</data>
|
| 148 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 149 |
+
</edge>
|
| 150 |
+
<edge id="e6" source="HOST-2858" target="b70574c1-0681-11ee-b53a-5d6415135f30">
|
| 151 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 152 |
+
<data key="e_timestamp">1703211575</data>
|
| 153 |
+
<data key="e_label_binary">malicious</data>
|
| 154 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 155 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 156 |
+
<data key="e_mo_name">Data Theft</data>
|
| 157 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 158 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 159 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 160 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 161 |
+
<data key="e_disposition">Disrupted</data>
|
| 162 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 163 |
+
</edge>
|
| 164 |
+
<edge id="e7" source="HOST-5043" target="HOST-2858">
|
| 165 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 166 |
+
<data key="e_timestamp">1703211575</data>
|
| 167 |
+
<data key="e_label_binary">malicious</data>
|
| 168 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 169 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 170 |
+
<data key="e_mo_name">Data Theft</data>
|
| 171 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 172 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 173 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 174 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 175 |
+
<data key="e_disposition">Disrupted</data>
|
| 176 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 177 |
+
</edge>
|
| 178 |
+
<edge id="e8" source="HOST-2858" target="HOST-5043">
|
| 179 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 180 |
+
<data key="e_timestamp">1703211575</data>
|
| 181 |
+
<data key="e_label_binary">malicious</data>
|
| 182 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 183 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 184 |
+
<data key="e_mo_name">Data Theft</data>
|
| 185 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 186 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 187 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 188 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 189 |
+
<data key="e_disposition">Disrupted</data>
|
| 190 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 191 |
+
</edge>
|
| 192 |
+
<edge id="e9" source="3770a660-6443-11ee-a136-af2d82818db7" target="HOST-2858">
|
| 193 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 194 |
+
<data key="e_timestamp">1703211575</data>
|
| 195 |
+
<data key="e_label_binary">malicious</data>
|
| 196 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 197 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 198 |
+
<data key="e_mo_name">Data Theft</data>
|
| 199 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 200 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 201 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 202 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 203 |
+
<data key="e_disposition">Disrupted</data>
|
| 204 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 205 |
+
</edge>
|
| 206 |
+
<edge id="e10" source="HOST-2858" target="3770a660-6443-11ee-a136-af2d82818db7">
|
| 207 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 208 |
+
<data key="e_timestamp">1703211575</data>
|
| 209 |
+
<data key="e_label_binary">malicious</data>
|
| 210 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 211 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 212 |
+
<data key="e_mo_name">Data Theft</data>
|
| 213 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 214 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 215 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 216 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 217 |
+
<data key="e_disposition">Disrupted</data>
|
| 218 |
+
<data key="e_incident_id">8ca72690-a070-11ee-8eba-81c30328b488</data>
|
| 219 |
+
</edge>
|
| 220 |
+
</graph>
|
| 221 |
+
</graphml>
|
graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c06c05f5-105a-11ee-824a-e5bb4f313279">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.54.98</data>
|
| 35 |
+
<data key="n_hostname">100.64.54.98</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="589b8491-104c-11ee-bd12-05689cf440e1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.184.211.180</data>
|
| 43 |
+
<data key="n_hostname">10.184.211.180</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17033" target="HOST-17315">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714616001</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">8caf3a30-0829-11ef-9432-0316676438e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.174.172</data>
|
| 35 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e08bce80-3a1f-11ee-804e-7bda33583aba">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.49.202</data>
|
| 43 |
+
<data key="n_hostname">100.64.49.202</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2946" target="HOST-8676">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697830410</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="07f28d90-2900-11ef-9c4f-074efb30849a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.59.91</data>
|
| 35 |
+
<data key="n_hostname">172.30.59.91</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1f53e53a-29c6-11ef-a7e4-cfafb31db32d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.77.161</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-2122.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17260" target="1f53e53a-29c6-11ef-a7e4-cfafb31db32d">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1720457587</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8cb6a8f0-3d4a-11ef-b144-c9d8335db792</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.18.101</data>
|
| 35 |
+
<data key="n_hostname">100.64.18.101</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="36d68130-0628-11ee-b3b1-23c171fd7d30">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.73.89</data>
|
| 43 |
+
<data key="n_hostname">100.64.73.89</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e" target="HOST-13275">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688490145</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-13275" target="01025ff0-062a-11ee-a8f9-fdb12cb0dc3e">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1688490145</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml
ADDED
|
@@ -0,0 +1,185 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.21.195.227</data>
|
| 35 |
+
<data key="n_hostname">172.21.195.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.89.34</data>
|
| 43 |
+
<data key="n_hostname">100.64.89.34</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="09652000-9de4-11ed-8f95-5d1d6230162f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.90.112</data>
|
| 51 |
+
<data key="n_hostname">100.64.90.112</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="fdada9b1-9dbd-11ed-9e2f-a52f5f954014">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.90.113</data>
|
| 59 |
+
<data key="n_hostname">100.64.90.113</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.88.243</data>
|
| 67 |
+
<data key="n_hostname">100.64.88.243</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1679447521</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 77 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Disrupted</data>
|
| 84 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="fa5a5da1-9d89-11ed-a0d9-bbd531499cbc" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1679447521</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 91 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Disrupted</data>
|
| 98 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="09652000-9de4-11ed-8f95-5d1d6230162f">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1679447521</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 105 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Disrupted</data>
|
| 112 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="09652000-9de4-11ed-8f95-5d1d6230162f" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1679447521</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 119 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Disrupted</data>
|
| 126 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="fdada9b1-9dbd-11ed-9e2f-a52f5f954014">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1679447521</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 133 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Disrupted</data>
|
| 140 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="fdada9b1-9dbd-11ed-9e2f-a52f5f954014" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1679447521</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 147 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Disrupted</data>
|
| 154 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 155 |
+
</edge>
|
| 156 |
+
<edge id="e7" source="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc" target="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc">
|
| 157 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 158 |
+
<data key="e_timestamp">1679447521</data>
|
| 159 |
+
<data key="e_label_binary">malicious</data>
|
| 160 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 161 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 162 |
+
<data key="e_mo_name">Data Theft</data>
|
| 163 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 164 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 165 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 166 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 167 |
+
<data key="e_disposition">Disrupted</data>
|
| 168 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 169 |
+
</edge>
|
| 170 |
+
<edge id="e8" source="ac3d4703-9d8d-11ed-a0d9-bbd531499cbc" target="8b4eefc5-9d89-11ed-a0d9-bbd531499cbc">
|
| 171 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 172 |
+
<data key="e_timestamp">1679447521</data>
|
| 173 |
+
<data key="e_label_binary">malicious</data>
|
| 174 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 175 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 176 |
+
<data key="e_mo_name">Data Theft</data>
|
| 177 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 178 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 179 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 180 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 181 |
+
<data key="e_disposition">Disrupted</data>
|
| 182 |
+
<data key="e_incident_id">8cb7bf50-c84e-11ed-9476-bf08a649e623</data>
|
| 183 |
+
</edge>
|
| 184 |
+
</graph>
|
| 185 |
+
</graphml>
|
graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="831476a0-1411-11ee-9b3a-cffef1e71f38">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.65.70</data>
|
| 35 |
+
<data key="n_hostname">100.64.65.70</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="831476a0-1411-11ee-9b3a-cffef1e71f38" target="HOST-2858">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1687777610</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">8cb9cb10-1411-11ee-918c-e193118b03e7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|