diff --git a/graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml b/graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f273356198e5620af83afe90423ffddb521c4e5c
--- /dev/null
+++ b/graph/incidents_graphml/8/8b7bff80-6b27-11ee-bff6-eb2f5319dd87.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.168
+ 100.64.19.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352808
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8b7bff80-6b27-11ee-bff6-eb2f5319dd87
+
+
+
diff --git a/graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml b/graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65df2618ef3c198a42f1f59427debd9c140ad3ca
--- /dev/null
+++ b/graph/incidents_graphml/8/8b893be0-7aff-11ee-a7a4-7da27d63d8ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699094847
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8b893be0-7aff-11ee-a7a4-7da27d63d8ce
+
+
+
diff --git a/graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml b/graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef0b1f13c02d5336dcef92d6502cd71fa00c3c95
--- /dev/null
+++ b/graph/incidents_graphml/8/8b8e2e80-3d4a-11ef-b144-c9d8335db792.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.51.72
+ USER-0015-2121.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720457585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8b8e2e80-3d4a-11ef-b144-c9d8335db792
+
+
+
diff --git a/graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml b/graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d18965aea5b527a8949d87a550611740218d3691
--- /dev/null
+++ b/graph/incidents_graphml/8/8b8eab90-1711-11ee-87cc-f345d7566905.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.192
+ 100.64.77.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.72
+ 100.64.72.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.60.227
+ 100.64.60.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.6.6
+ 100.64.6.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.32.52
+ USER-0015-1764.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b8eab90-1711-11ee-87cc-f345d7566905
+
+
+
diff --git a/graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml b/graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c26fe3d8eaa2a2e9dd62345ee105dfa4c52a1338
--- /dev/null
+++ b/graph/incidents_graphml/8/8b98a530-7aff-11ee-a7a4-7da27d63d8ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699094847
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8b98a530-7aff-11ee-a7a4-7da27d63d8ce
+
+
+
diff --git a/graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml b/graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddb36ea113cd8c912a8bf219f2356089174ed350
--- /dev/null
+++ b/graph/incidents_graphml/8/8b98d650-6b27-11ee-bff6-eb2f5319dd87.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352808
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8b98d650-6b27-11ee-bff6-eb2f5319dd87
+
+
+
diff --git a/graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b70e182a506abb98a40f37df5f061d2f0ac38052
--- /dev/null
+++ b/graph/incidents_graphml/8/8b9e5ac0-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.66
+ 100.64.74.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.41
+ 100.64.71.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.29.39
+ 100.64.29.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b9e5ac0-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b9e5ac0-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b9e5ac0-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8b9e5ac0-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml b/graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d809bc7d2b554ce077be8c9ae36b235203b4bbe
--- /dev/null
+++ b/graph/incidents_graphml/8/8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.226
+ 100.64.17.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699094847
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8ba6fd10-7aff-11ee-a7a4-7da27d63d8ce
+
+
+
diff --git a/graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml b/graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82250aace6ccabd589ac7839b81a7d1d62fa6210
--- /dev/null
+++ b/graph/incidents_graphml/8/8ba72e30-6b27-11ee-bff6-eb2f5319dd87.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ba72e30-6b27-11ee-bff6-eb2f5319dd87
+
+
+
diff --git a/graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4b2b3e090b7df5db84e21de8893d5e22372143b
--- /dev/null
+++ b/graph/incidents_graphml/8/8bc30b80-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.43
+ 100.64.77.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8bc30b80-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d095c1bc8a348cc766b53e963a3f7bdaafce5d62
--- /dev/null
+++ b/graph/incidents_graphml/8/8bc6a340-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.67
+ 100.64.74.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.228
+ USER-0015-1671.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Umbrella","Meraki","Cisco Meraki Firewall","Stealthwatch","Windows Active Directory"]
+
+
+ HOST
+ 100.64.74.68
+ 100.64.74.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8bc6a340-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8bc6a340-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8bc6a340-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8bc6a340-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a66dd2141aa937f115540e458db02b2ea2359a3
--- /dev/null
+++ b/graph/incidents_graphml/8/8bd37340-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8bd37340-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c87f29a1c58dd1ade9d9b5fddcaeca37b2d81806
--- /dev/null
+++ b/graph/incidents_graphml/8/8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.214
+ 100.64.81.214
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.49
+ USER-0015-1822.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.215
+ 100.64.81.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543747
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd891b0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+
diff --git a/graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..869019f0e1d6133208a97c1da9d94962bcbdc35e
--- /dev/null
+++ b/graph/incidents_graphml/8/8bd8b660-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.232.245
+ 192.168.232.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.44
+ 100.64.77.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689002104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd8b660-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8bd8b660-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml b/graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1a441b81d6f6f15ad4e20589b58484204ec9914
--- /dev/null
+++ b/graph/incidents_graphml/8/8be8ad10-561f-11ed-90b9-dd5c5c82d817.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.111
+ 100.64.95.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666892900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8be8ad10-561f-11ed-90b9-dd5c5c82d817
+
+
+
diff --git a/graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml b/graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75a15122f1e2b8b613b4f5af942410ad602d1b9b
--- /dev/null
+++ b/graph/incidents_graphml/8/8bec5690-561f-11ed-90b9-dd5c5c82d817.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.111
+ 100.64.95.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666892900
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8bec5690-561f-11ed-90b9-dd5c5c82d817
+
+
+
diff --git a/graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml b/graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..857ad168cd51a27841f8fb3f696a227ca2b4ca23
--- /dev/null
+++ b/graph/incidents_graphml/8/8bf07540-561f-11ed-90b9-dd5c5c82d817.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.113
+ 100.64.95.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666892901
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8bf07540-561f-11ed-90b9-dd5c5c82d817
+
+
+
diff --git a/graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dca16d0ec76a1d54334036efbcac5a6f0972f883
--- /dev/null
+++ b/graph/incidents_graphml/8/8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787931
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8bfe7ae0-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..807739c19e6a06b19e50cd7799607d9e5076f7e5
--- /dev/null
+++ b/graph/incidents_graphml/8/8c0b74a0-5c89-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.153
+ 100.64.11.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0b74a0-5c89-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef182e14b8e9f11bda7d68a37dc7a80ecaf1f64e
--- /dev/null
+++ b/graph/incidents_graphml/8/8c0d8530-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862192
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c0d8530-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8c147881febc7e1ae2e4d7ddc22ddfd2a448d67
--- /dev/null
+++ b/graph/incidents_graphml/8/8c18f940-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,453 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.209
+ 100.64.33.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.52.54
+ 100.64.52.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.55
+ 100.64.52.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.56
+ 100.64.52.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.57
+ 100.64.52.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.17
+ 100.64.47.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c18f940-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d649695ad7efbb3a10d5cd81278ea9bee9efe5d
--- /dev/null
+++ b/graph/incidents_graphml/8/8c1a1930-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787931
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c1a1930-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d465a0fccea5ea6c445056b005b57b75bd46b90e
--- /dev/null
+++ b/graph/incidents_graphml/8/8c23e040-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.89
+ 100.64.95.89
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1716105495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c23e040-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c23e040-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c23e040-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c23e040-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afc6810783520fec8252d276aa96b8247df9debe
--- /dev/null
+++ b/graph/incidents_graphml/8/8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830409
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c31fcc0-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..046cb7f79043c0c5402ee43a65886805043bfcca
--- /dev/null
+++ b/graph/incidents_graphml/8/8c4ac100-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.144.247.94
+ 10.144.247.94
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.158
+ 100.64.87.158
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.159
+ 100.64.87.159
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.160
+ 100.64.87.160
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.161
+ 100.64.87.161
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.162
+ 100.64.87.162
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.163
+ 100.64.87.163
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.164
+ 100.64.87.164
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.165
+ 100.64.87.165
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.166
+ 100.64.87.166
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.167
+ 100.64.87.167
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ac100-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7385859503f50c861617b8613513dbb6268b77b
--- /dev/null
+++ b/graph/incidents_graphml/8/8c4ad220-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.83.16
+ 192.168.83.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.72.150
+ 100.64.72.150
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687961434
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ad220-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961434
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c4ad220-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..924cb309c5a117607809664d668693698505ed0c
--- /dev/null
+++ b/graph/incidents_graphml/8/8c4e9560-b125-11ed-8c7d-65e7f37a4d8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.147
+ 100.64.83.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.7.65.131
+ 10.7.65.131
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676901034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c4e9560-b125-11ed-8c7d-65e7f37a4d8d
+
+
+
diff --git a/graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1e949210e70f19920ef67dfb58b74644b715a97
--- /dev/null
+++ b/graph/incidents_graphml/8/8c532940-b125-11ed-8c7d-65e7f37a4d8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.7.65.131
+ 10.7.65.131
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.147
+ 100.64.83.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676901034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c532940-b125-11ed-8c7d-65e7f37a4d8d
+
+
+
diff --git a/graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cc51d2ebd2e59a05953fc9dbc0642923501ee54
--- /dev/null
+++ b/graph/incidents_graphml/8/8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.69
+ 100.64.54.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888357
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c53fa50-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0024beb5c170b1802c6a75c272c10bd11045a2f3
--- /dev/null
+++ b/graph/incidents_graphml/8/8c55e490-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.178
+ 100.64.87.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c55e490-87f5-11ed-9f01-ef8ef15959cb
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c55e490-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..878d2c3acc79011ee7c00d5963c94d7a9504476e
--- /dev/null
+++ b/graph/incidents_graphml/8/8c5aeda0-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.178
+ 100.64.87.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672372420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c5aeda0-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ed6ef59be63b622d9113e01c9f2c3ab2d4487db
--- /dev/null
+++ b/graph/incidents_graphml/8/8c5be180-117d-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.147
+ 100.64.60.147
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c5be180-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c5be180-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c5be180-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494141
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c5be180-117d-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..592cf8984b477b5028a0c3eb7d675c4df90e3e75
--- /dev/null
+++ b/graph/incidents_graphml/8/8c5da680-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.229
+ 100.64.48.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427701
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c5da680-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43762dbadbe99853bda4bc2405a9cb38e269d997
--- /dev/null
+++ b/graph/incidents_graphml/8/8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.163
+ 100.64.31.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830410
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c5deec0-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b11d3b35c7e7f5bb9ffbb92022bd159849189be
--- /dev/null
+++ b/graph/incidents_graphml/8/8c677920-6d65-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.190
+ 100.64.34.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.198
+ 100.64.54.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.45
+ 100.64.34.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.199
+ 100.64.54.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.235
+ 100.64.27.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.200
+ 100.64.54.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.202
+ 100.64.51.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.210
+ 100.64.20.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.201
+ 100.64.54.201
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.236
+ 100.64.46.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697599341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8c677920-6d65-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28ab2e708dd5f7be28a5f319b68aff9f6cc8ff3
--- /dev/null
+++ b/graph/incidents_graphml/8/8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830410
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c6dcd40-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7eeaea949503407b744da892deb5f71de0e4249d
--- /dev/null
+++ b/graph/incidents_graphml/8/8c793590-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888357
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c793590-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml b/graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71377147204c3e7d893ecc651882eb6ba3693dd5
--- /dev/null
+++ b/graph/incidents_graphml/8/8c7a83c0-6b27-11ee-bff6-eb2f5319dd87.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697352810
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c7a83c0-6b27-11ee-bff6-eb2f5319dd87
+
+
+ INCIDENT_LINK
+ 1697352810
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c7a83c0-6b27-11ee-bff6-eb2f5319dd87
+
+
+ INCIDENT_LINK
+ 1697352810
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c7a83c0-6b27-11ee-bff6-eb2f5319dd87
+
+
+
diff --git a/graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40a2e40944d3ab6c7c4bd71ecc4144cb3bb33565
--- /dev/null
+++ b/graph/incidents_graphml/8/8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8c7c7340-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fdea7e2db4a5f4b3c97f848284836e6d145ea2a
--- /dev/null
+++ b/graph/incidents_graphml/8/8c83cc20-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.229
+ 100.64.48.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427701
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c83cc20-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3711dbe154e5dc8632cc0f2f3c8ff1eae454a278
--- /dev/null
+++ b/graph/incidents_graphml/8/8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888357
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8c87b480-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f977284815ccbdccc320ee7fce6fbfb77dd4bde
--- /dev/null
+++ b/graph/incidents_graphml/8/8c9ceab0-0829-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.19.192
+ 100.64.19.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714616001
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8c9ceab0-0829-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc27e37d149c42857f8296cfe87010099d9ef16d
--- /dev/null
+++ b/graph/incidents_graphml/8/8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.202
+ 100.64.49.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830410
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca16060-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..275d59c6a1627a9f787340af046a11af0620bb51
--- /dev/null
+++ b/graph/incidents_graphml/8/8ca72690-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.107
+ 100.64.53.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.168
+ 100.64.10.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.108
+ 100.64.53.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.62
+ 100.64.24.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.109
+ 100.64.53.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211575
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ca72690-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fe3e73242a53f4cfcc77998936ffd640a6376cd
--- /dev/null
+++ b/graph/incidents_graphml/8/8caf3a30-0829-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1714616001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8caf3a30-0829-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54c7f4114b923a75df5b2ae9bbc4a818b1d75b88
--- /dev/null
+++ b/graph/incidents_graphml/8/8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.202
+ 100.64.49.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830410
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb07b90-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml b/graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e133f9995c7521bceb7a5310dde5b0db2d5eb0d0
--- /dev/null
+++ b/graph/incidents_graphml/8/8cb6a8f0-3d4a-11ef-b144-c9d8335db792.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.59.91
+ 172.30.59.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.77.161
+ USER-0015-2122.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720457587
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cb6a8f0-3d4a-11ef-b144-c9d8335db792
+
+
+
diff --git a/graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06d2309e070142448d56ce5ae45b18242f813d69
--- /dev/null
+++ b/graph/incidents_graphml/8/8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688490145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb6adf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b7b1c05dacb66c9b242424900f38dadaefede88
--- /dev/null
+++ b/graph/incidents_graphml/8/8cb7bf50-c84e-11ed-9476-bf08a649e623.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.195.227
+ 172.21.195.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.34
+ 100.64.89.34
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.112
+ 100.64.90.112
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.113
+ 100.64.90.113
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.243
+ 100.64.88.243
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447521
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cb7bf50-c84e-11ed-9476-bf08a649e623
+
+
+
diff --git a/graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e313c02c17f247ebcc6a0ae087ed4b026fa03dc6
--- /dev/null
+++ b/graph/incidents_graphml/8/8cb9cb10-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.70
+ 100.64.65.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777610
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cb9cb10-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/8/8cc00550-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8cc00550-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72723d39d2ca4eab8bb93fca02c58467ebc60c3a
--- /dev/null
+++ b/graph/incidents_graphml/8/8cc00550-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.238
+ 100.64.51.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cc00550-21f6-11ee-910a-0b067d3bfd22
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cc00550-21f6-11ee-910a-0b067d3bfd22
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cc00550-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8ccbe660-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/8/8ccbe660-2957-11ed-833a-955cfd42297d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a500f5521865ac155eaa3b727d7377245eba0d2a
--- /dev/null
+++ b/graph/incidents_graphml/8/8ccbe660-2957-11ed-833a-955cfd42297d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.37.38
+ 172.22.37.38
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.142
+ 100.64.88.142
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661969151
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ccbe660-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969151
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ccbe660-2957-11ed-833a-955cfd42297d
+
+
+
diff --git a/graph/incidents_graphml/8/8cceef80-2bbd-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/8/8cceef80-2bbd-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b74696b2d46a5f6630816ab0753a4c197e924fc4
--- /dev/null
+++ b/graph/incidents_graphml/8/8cceef80-2bbd-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.94
+ 100.64.24.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.245
+ 100.64.19.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.181
+ 100.64.2.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527858
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cceef80-2bbd-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/8/8cd6f000-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/8/8cd6f000-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa4209486e9579d17371e98af25a5bcbb6cf4cef
--- /dev/null
+++ b/graph/incidents_graphml/8/8cd6f000-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.70
+ 100.64.65.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777610
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cd6f000-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/8/8cd736d0-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8cd736d0-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44e2cf3f2493edd065d4aee5a4e91783a2a7de7d
--- /dev/null
+++ b/graph/incidents_graphml/8/8cd736d0-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.238
+ 100.64.51.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8cd736d0-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8cd91230-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8cd91230-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e52b3f8176d820e259ac107d252f3b3862018442
--- /dev/null
+++ b/graph/incidents_graphml/8/8cd91230-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.17
+ 100.64.11.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cd91230-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8ce8a290-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8ce8a290-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a08d0df0ec511334c1af43b0acc573514ba07d83
--- /dev/null
+++ b/graph/incidents_graphml/8/8ce8a290-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8ce8a290-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8cf10ce0-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8cf10ce0-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..268683fb4c7dd7d02fd7e9538117cc78b3ced8f4
--- /dev/null
+++ b/graph/incidents_graphml/8/8cf10ce0-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.51
+ 100.64.8.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8cf10ce0-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8cf28700-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8cf28700-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa4953987f1c464399c8a9d8bdc457b140af845a
--- /dev/null
+++ b/graph/incidents_graphml/8/8cf28700-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.238
+ 100.64.51.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8cf28700-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8cf8cf30-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8cf8cf30-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10011def883115aa52d9703c647c516ffe88bc33
--- /dev/null
+++ b/graph/incidents_graphml/8/8cf8cf30-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830411
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8cf8cf30-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8cf9ad40-1711-11ee-87cc-f345d7566905.graphml b/graph/incidents_graphml/8/8cf9ad40-1711-11ee-87cc-f345d7566905.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93194f5715b211eeff39787199fd6e8618681613
--- /dev/null
+++ b/graph/incidents_graphml/8/8cf9ad40-1711-11ee-87cc-f345d7566905.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.58.130
+ 192.168.58.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.193
+ 100.64.77.193
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688107464
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8cf9ad40-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107464
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8cf9ad40-1711-11ee-87cc-f345d7566905
+
+
+
diff --git a/graph/incidents_graphml/8/8cfe1d80-0829-11ef-9432-0316676438e6.graphml b/graph/incidents_graphml/8/8cfe1d80-0829-11ef-9432-0316676438e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9bf472d5b2cf2d6494a1f14d66ad4c40daecc8b
--- /dev/null
+++ b/graph/incidents_graphml/8/8cfe1d80-0829-11ef-9432-0316676438e6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.186.190
+ 172.31.186.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.161
+ 100.64.97.161
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714616002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8cfe1d80-0829-11ef-9432-0316676438e6
+
+
+ INCIDENT_LINK
+ 1714616002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8cfe1d80-0829-11ef-9432-0316676438e6
+
+
+
diff --git a/graph/incidents_graphml/8/8d0c9eb0-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8d0c9eb0-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..296809fe37e099f8f4b44dffdd80f4b27a9acad0
--- /dev/null
+++ b/graph/incidents_graphml/8/8d0c9eb0-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.238
+ 100.64.51.238
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d0c9eb0-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8d102da0-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8d102da0-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27860c9d9270c68409f734876614e79f9d45a1de
--- /dev/null
+++ b/graph/incidents_graphml/8/8d102da0-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.51
+ 100.64.8.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d102da0-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8d27c7d0-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8d27c7d0-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dba10a06bfd4f93c57c3ba5334070a37bdef2d6e
--- /dev/null
+++ b/graph/incidents_graphml/8/8d27c7d0-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.242
+ 100.64.51.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d27c7d0-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8d3403d0-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8d3403d0-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbdc4ad6107426803e9a27e9932b72029dc968ab
--- /dev/null
+++ b/graph/incidents_graphml/8/8d3403d0-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.255
+ 100.64.32.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862194
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d3403d0-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8d3d2490-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8d3d2490-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3333e099beb94e5c69e76f7375305c294c28b7ea
--- /dev/null
+++ b/graph/incidents_graphml/8/8d3d2490-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.242
+ 100.64.51.242
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305331
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d3d2490-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8d3e63b0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml b/graph/incidents_graphml/8/8d3e63b0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f93b021c18054c03579f49770083148be783e9aa
--- /dev/null
+++ b/graph/incidents_graphml/8/8d3e63b0-6f7f-11ee-a9e9-8d9dc5e9b5de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.204
+ 100.64.49.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697830411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d3e63b0-6f7f-11ee-a9e9-8d9dc5e9b5de
+
+
+
diff --git a/graph/incidents_graphml/8/8d4b61e0-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8d4b61e0-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48a0fd6f9088dfeb666e339e10019ab78070c0e1
--- /dev/null
+++ b/graph/incidents_graphml/8/8d4b61e0-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d4b61e0-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8d4bd400-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/8/8d4bd400-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbb227065420ecdb2cbfcb1556cba65625e0cf27
--- /dev/null
+++ b/graph/incidents_graphml/8/8d4bd400-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.44
+ 100.64.37.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d4bd400-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/8/8d5ebfc0-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/8/8d5ebfc0-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8a4c6f9a51e0fbf1e5e2e8d9a73755f71bbf27d
--- /dev/null
+++ b/graph/incidents_graphml/8/8d5ebfc0-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.44
+ 100.64.37.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d5ebfc0-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/8/8d61d010-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8d61d010-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3d658e10d81dd85643489267faf1a94659a26d7
--- /dev/null
+++ b/graph/incidents_graphml/8/8d61d010-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427703
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8d61d010-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8d7030e0-36e7-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/8/8d7030e0-36e7-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a57ffdac7182414434d7eb5afa7da23895fa039
--- /dev/null
+++ b/graph/incidents_graphml/8/8d7030e0-36e7-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager"]
+
+
+ HOST
+ 100.64.86.191
+ 100.64.86.191
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755361
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8d7030e0-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755361
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8d7030e0-36e7-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/8/8d75e550-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/8/8d75e550-3249-11ef-8034-87bdea2d948c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..626da939bafa14853f94eeb31539df36b7ae3b62
--- /dev/null
+++ b/graph/incidents_graphml/8/8d75e550-3249-11ef-8034-87bdea2d948c.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.28.63.204
+ USER-0015-2061.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.99
+ 100.64.95.99
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.209
+ 100.64.95.209
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.107
+ 100.64.96.107
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.216
+ 100.64.89.216
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.108
+ 100.64.96.108
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.78
+ 100.64.87.78
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d75e550-3249-11ef-8034-87bdea2d948c
+
+
+
diff --git a/graph/incidents_graphml/8/8d7e3eb0-3d4a-11ef-b144-c9d8335db792.graphml b/graph/incidents_graphml/8/8d7e3eb0-3d4a-11ef-b144-c9d8335db792.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b719718060edb6bf0828cd06294c2ecd4db65554
--- /dev/null
+++ b/graph/incidents_graphml/8/8d7e3eb0-3d4a-11ef-b144-c9d8335db792.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.4.216
+ 100.64.4.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720457588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d7e3eb0-3d4a-11ef-b144-c9d8335db792
+
+
+
diff --git a/graph/incidents_graphml/8/8d8a6d00-fed2-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/8/8d8a6d00-fed2-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23fb12b07ad33704f8ece1c6564c490f7580d804
--- /dev/null
+++ b/graph/incidents_graphml/8/8d8a6d00-fed2-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.25.249
+ 100.64.25.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685441579
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d8a6d00-fed2-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/8/8d91fd20-e50b-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/8/8d91fd20-e50b-11ee-9817-3f0d09cf653c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d06c2ed246547eda989a3d1e8d1dfc70c9b2eb0
--- /dev/null
+++ b/graph/incidents_graphml/8/8d91fd20-e50b-11ee-9817-3f0d09cf653c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.134
+ 100.64.22.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710754827
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8d91fd20-e50b-11ee-9817-3f0d09cf653c
+
+
+
diff --git a/graph/incidents_graphml/8/8d94b4e0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8d94b4e0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fd9d1970a45244256253506d67cf1309e90ad53
--- /dev/null
+++ b/graph/incidents_graphml/8/8d94b4e0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139649
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d94b4e0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8d966560-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8d966560-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..544403237dc1b765c7757dcb99ad5fed46f86ad7
--- /dev/null
+++ b/graph/incidents_graphml/8/8d966560-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888359
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8d966560-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8da24970-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8da24970-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e48536c363c9b6d5923b25493188d9d8e549a5de
--- /dev/null
+++ b/graph/incidents_graphml/8/8da24970-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.86
+ 100.64.22.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8da24970-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8da7ca80-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8da7ca80-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..948029a0ac8c754e3cda3ed508c7aa8b7dd1218b
--- /dev/null
+++ b/graph/incidents_graphml/8/8da7ca80-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.71
+ 100.64.54.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888359
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8da7ca80-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8db1d9d0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8db1d9d0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd68923cfbb3461827aec96190a62b267cf415e4
--- /dev/null
+++ b/graph/incidents_graphml/8/8db1d9d0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.86
+ 100.64.22.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8db1d9d0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8db42690-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8db42690-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae81a255f5edada586ae15e684fb0b288a1caf92
--- /dev/null
+++ b/graph/incidents_graphml/8/8db42690-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.71
+ 100.64.54.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888359
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8db42690-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8db75010-3d4a-11ef-b144-c9d8335db792.graphml b/graph/incidents_graphml/8/8db75010-3d4a-11ef-b144-c9d8335db792.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..546d590ef9e82a08834b4d50c084de8245d31915
--- /dev/null
+++ b/graph/incidents_graphml/8/8db75010-3d4a-11ef-b144-c9d8335db792.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.31
+ 100.64.28.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1984.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720457588
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8db75010-3d4a-11ef-b144-c9d8335db792
+
+
+
diff --git a/graph/incidents_graphml/8/8db82a50-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/8/8db82a50-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9002e661277f7c7f952237650649650bf21d08e
--- /dev/null
+++ b/graph/incidents_graphml/8/8db82a50-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.62
+ 100.64.52.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.47.117
+ 100.64.47.117
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.63
+ 100.64.52.63
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.169
+ 100.64.26.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.234
+ 100.64.7.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.246
+ 100.64.51.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.64
+ 100.64.52.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+ INCIDENT_LINK
+ 1684999627
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8db82a50-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/8/8dbda180-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/8/8dbda180-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e35ec9ac61dcb4ca39c8bc8745dc117a077a76b2
--- /dev/null
+++ b/graph/incidents_graphml/8/8dbda180-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.211
+ 100.64.22.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122733
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8dbda180-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/8/8dc031b0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8dc031b0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d3a3aab7d329b7b4ef5957d2c2dffb1b7a2520f
--- /dev/null
+++ b/graph/incidents_graphml/8/8dc031b0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.247
+ 100.64.39.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8dc031b0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8dc26cf0-fed2-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/8/8dc26cf0-fed2-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bce6caf8c56ad4cd835a6b5d0e7cf526fb3b9a3e
--- /dev/null
+++ b/graph/incidents_graphml/8/8dc26cf0-fed2-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.95
+ 100.64.26.95
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685441579
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8dc26cf0-fed2-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/8/8dc3d190-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/8/8dc3d190-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0a54d348abf17a50376ed82eaa5896f4d97ccf0
--- /dev/null
+++ b/graph/incidents_graphml/8/8dc3d190-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.54
+ 100.64.24.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787934
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dc3d190-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/8/8dc42c20-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8dc42c20-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f914243b95734ab7bb396c391b5debbaf157fbe
--- /dev/null
+++ b/graph/incidents_graphml/8/8dc42c20-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888359
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8dc42c20-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8dcab100-3d4a-11ef-b144-c9d8335db792.graphml b/graph/incidents_graphml/8/8dcab100-3d4a-11ef-b144-c9d8335db792.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d53feb7de5b587302ff80a6dc8db6b726f35e2d
--- /dev/null
+++ b/graph/incidents_graphml/8/8dcab100-3d4a-11ef-b144-c9d8335db792.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1984.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.28.31
+ 100.64.28.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720457588
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8dcab100-3d4a-11ef-b144-c9d8335db792
+
+
+
diff --git a/graph/incidents_graphml/8/8dcd42e0-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/8/8dcd42e0-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a4a9ef00136cc2ccf2e298a1394a65d52a6e173
--- /dev/null
+++ b/graph/incidents_graphml/8/8dcd42e0-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.31
+ 100.64.11.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691479015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dcd42e0-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dcd42e0-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/8/8dcf9b00-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8dcf9b00-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c11069847a9f8c4006f1def7ee1fec97b716071a
--- /dev/null
+++ b/graph/incidents_graphml/8/8dcf9b00-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.247
+ 100.64.39.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8dcf9b00-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8dd0fd60-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8dd0fd60-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4ca462e4b2f50b07fc9e418f3ae5c2bfdd8588a
--- /dev/null
+++ b/graph/incidents_graphml/8/8dd0fd60-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888360
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8dd0fd60-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8dd2bac0-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/8/8dd2bac0-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d60540470a94b1cd88e6f8c2b46ddfa1dcd2cb6a
--- /dev/null
+++ b/graph/incidents_graphml/8/8dd2bac0-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.33.32
+ 192.168.33.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.80.200
+ 100.64.80.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687449047
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dd2bac0-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449047
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dd2bac0-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/8/8dd2e160-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8dd2e160-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6efceb5c5325b8db9ed877b943988074077ac311
--- /dev/null
+++ b/graph/incidents_graphml/8/8dd2e160-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.235
+ 100.64.60.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8dd2e160-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8de1e200-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/8/8de1e200-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..289a38190cc4413e2fc2c7441c3f94e50acb8422
--- /dev/null
+++ b/graph/incidents_graphml/8/8de1e200-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.194
+ 100.64.26.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145864
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8de1e200-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/8/8de40600-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/8/8de40600-221a-11ef-a5a3-b5bcb77a69cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a863ae760e2d0442ab3f4e2ebb4fe6fa6b8ae535
--- /dev/null
+++ b/graph/incidents_graphml/8/8de40600-221a-11ef-a5a3-b5bcb77a69cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.42
+ 100.64.15.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717468291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8de40600-221a-11ef-a5a3-b5bcb77a69cd
+
+
+
diff --git a/graph/incidents_graphml/8/8de56fc0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8de56fc0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae7a50175ff7f2aefb88cf01bbdaea33424c24f2
--- /dev/null
+++ b/graph/incidents_graphml/8/8de56fc0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.73
+ 100.64.54.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8de56fc0-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8df012d0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/8/8df012d0-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8677738aca347fe98c19b342a9f9936fff593e3
--- /dev/null
+++ b/graph/incidents_graphml/8/8df012d0-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.194
+ 100.64.26.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145864
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8df012d0-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/8/8df219f0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/8/8df219f0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7005b473d4576786cceda75da106824c725ebb3
--- /dev/null
+++ b/graph/incidents_graphml/8/8df219f0-54bd-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.73
+ 100.64.54.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694888360
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8df219f0-54bd-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/8/8dfd25b0-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8dfd25b0-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bba1c85a7684a70d35532545a869cfb2aef13202
--- /dev/null
+++ b/graph/incidents_graphml/8/8dfd25b0-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.235
+ 100.64.60.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8dfd25b0-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8e09a5c0-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/8/8e09a5c0-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..917fbabff2eac115d792bb8bd605854dfa5fcbaf
--- /dev/null
+++ b/graph/incidents_graphml/8/8e09a5c0-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.129
+ 100.64.35.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826880
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e09a5c0-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/8/8e156390-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/8/8e156390-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4dbb82ef1232e8723f2eefd0e658061f35fe2bc
--- /dev/null
+++ b/graph/incidents_graphml/8/8e156390-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104764
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8e156390-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/8/8e173d60-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8e173d60-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d719186e46745f1fb71e4e61f52b7d5147a66f72
--- /dev/null
+++ b/graph/incidents_graphml/8/8e173d60-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.237
+ USER-0015-1442.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8e173d60-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8e239460-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/8/8e239460-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f64968b0914d84414371293bb53c64bba9d1049
--- /dev/null
+++ b/graph/incidents_graphml/8/8e239460-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.70
+ 100.64.25.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104764
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e239460-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/8/8e2480c0-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/8/8e2480c0-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71cb1b3619b6bdbdf78b8089bd2202e1a805adda
--- /dev/null
+++ b/graph/incidents_graphml/8/8e2480c0-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.46
+ 100.64.37.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826880
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e2480c0-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/8/8e348960-07ca-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/8/8e348960-07ca-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cba6f95a666fdea00f4f7513313be97b3588fff
--- /dev/null
+++ b/graph/incidents_graphml/8/8e348960-07ca-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.237
+ USER-0015-1442.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686427704
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e348960-07ca-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/8/8e376c80-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/8/8e376c80-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee81e0efbf003b51dd1c8122dc9b1a23a27b5c3d
--- /dev/null
+++ b/graph/incidents_graphml/8/8e376c80-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.46
+ 100.64.37.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826880
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e376c80-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/8/8e3801f0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/8/8e3801f0-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0d313d2060522cf39767e3f09d8f13d08c2273a
--- /dev/null
+++ b/graph/incidents_graphml/8/8e3801f0-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.177
+ 100.64.18.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e3801f0-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/8/8e39ec60-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/8/8e39ec60-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05e8d72b857c430c51fda82ff45b99f72fc3fc17
--- /dev/null
+++ b/graph/incidents_graphml/8/8e39ec60-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e39ec60-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e39ec60-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/8/8e40b520-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/8/8e40b520-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80f131ce078c024e5a069db52062641fe9f754c9
--- /dev/null
+++ b/graph/incidents_graphml/8/8e40b520-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.184
+ 100.64.76.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.36.85
+ 100.64.36.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686806950
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e40b520-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806950
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e40b520-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/8/8e411920-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/8/8e411920-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36211980e93bf7c164a045fdc9c51850a714ec6f
--- /dev/null
+++ b/graph/incidents_graphml/8/8e411920-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.244
+ 100.64.12.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.245
+ 100.64.12.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.247
+ 100.64.12.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.248
+ 100.64.12.248
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.249
+ 100.64.12.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.250
+ 100.64.12.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.251
+ 100.64.12.251
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.252
+ 100.64.12.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.253
+ 100.64.12.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.115
+ 100.64.4.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.254
+ 100.64.12.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.255
+ 100.64.12.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e411920-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/8/8e5627c0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/8/8e5627c0-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c04c65d94ec58573d58d8bf35fa435cfdb50e3f
--- /dev/null
+++ b/graph/incidents_graphml/8/8e5627c0-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.244
+ 100.64.12.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372743
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e5627c0-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/8/8e602170-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8e602170-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdd11add3c8b06c741bfb5e75717d447505eebe8
--- /dev/null
+++ b/graph/incidents_graphml/8/8e602170-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.169
+ USER-0015-1225.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e602170-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8e65b750-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/8/8e65b750-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57c805ce557da9858a17c282317a8e006daa3f94
--- /dev/null
+++ b/graph/incidents_graphml/8/8e65b750-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.98
+ 100.64.77.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.235
+ 100.64.71.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e65b750-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e65b750-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/8/8e6d00d0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/8/8e6d00d0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bceb92199a3e54b27f678d533ac812d82cb54c7
--- /dev/null
+++ b/graph/incidents_graphml/8/8e6d00d0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071091
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e6d00d0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/8/8e721d50-ec43-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/8/8e721d50-ec43-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acc19d6c294c80f4c21689e6b237f061cce586eb
--- /dev/null
+++ b/graph/incidents_graphml/8/8e721d50-ec43-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.39
+ 100.64.71.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ USER-0015-1612.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655253543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e721d50-ec43-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655253543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e721d50-ec43-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/8/8e778050-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8e778050-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d04da35ffc6e02fe42bf1ee6973cbbca5ce14fd7
--- /dev/null
+++ b/graph/incidents_graphml/8/8e778050-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.60
+ 100.64.12.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862196
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e778050-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8e77d5b0-1b82-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/8/8e77d5b0-1b82-11ed-9931-5799b48b5de2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad040d669d86d7561513220695f08752197a50d1
--- /dev/null
+++ b/graph/incidents_graphml/8/8e77d5b0-1b82-11ed-9931-5799b48b5de2.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.114
+ 100.64.74.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.69
+ 100.64.72.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.220
+ 100.64.73.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.170
+ 100.64.79.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.171
+ 100.64.79.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448306
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e77d5b0-1b82-11ed-9931-5799b48b5de2
+
+
+
diff --git a/graph/incidents_graphml/8/8e7a6030-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8e7a6030-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1a984543666f471482f92a1937fb5bce0383ee2
--- /dev/null
+++ b/graph/incidents_graphml/8/8e7a6030-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.171
+ 100.64.20.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506143
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e7a6030-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8e842380-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8e842380-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e3fb86d2c40c2a657c769364eb2b51a63d446ff
--- /dev/null
+++ b/graph/incidents_graphml/8/8e842380-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.244
+ 100.64.51.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e842380-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8e892d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8e892d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1b74bf99fa9ddc4534c52ecb3b09b5cd5dfaf77
--- /dev/null
+++ b/graph/incidents_graphml/8/8e892d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.171
+ 100.64.20.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506143
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e892d40-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8e969ce0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/8/8e969ce0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f9402bd20cfac681c07316cc85046d3f4af510e
--- /dev/null
+++ b/graph/incidents_graphml/8/8e969ce0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.159
+ USER-0015-1897.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.37.70
+ 100.64.37.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681490640
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8e969ce0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/8/8e96a110-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8e96a110-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a52ed7e47ad172e7e2b9339b994d5f7f9c666c62
--- /dev/null
+++ b/graph/incidents_graphml/8/8e96a110-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.10
+ 100.64.38.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862196
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8e96a110-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8e96d500-d4db-11ee-bf25-f161a8731bfd.graphml b/graph/incidents_graphml/8/8e96d500-d4db-11ee-bf25-f161a8731bfd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f943d7a1b6ef3404d34b59ad54be47770b1afc6
--- /dev/null
+++ b/graph/incidents_graphml/8/8e96d500-d4db-11ee-bf25-f161a8731bfd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.161
+ 100.64.27.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708974995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8e96d500-d4db-11ee-bf25-f161a8731bfd
+
+
+
diff --git a/graph/incidents_graphml/8/8e9f7680-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/8/8e9f7680-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4571b5697b00ee3d57ac07af990d754a29dd8cdb
--- /dev/null
+++ b/graph/incidents_graphml/8/8e9f7680-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490640
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8e9f7680-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/8/8ea45cb0-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8ea45cb0-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a58d1a328c072a0470d6cf9784f63cebbed41e17
--- /dev/null
+++ b/graph/incidents_graphml/8/8ea45cb0-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.220
+ 100.64.15.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862196
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8ea45cb0-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8ea7b110-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8ea7b110-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e19ad95b2be4d5d219b8a1c6848d2055bfc49a5
--- /dev/null
+++ b/graph/incidents_graphml/8/8ea7b110-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.244
+ 100.64.51.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ea7b110-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8ea8b100-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/8/8ea8b100-1067-11ee-aaa6-7f821bc3777a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e99c5e9cf02d59ea8a4a47b862ebc4a136938a5
--- /dev/null
+++ b/graph/incidents_graphml/8/8ea8b100-1067-11ee-aaa6-7f821bc3777a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.20
+ 100.64.59.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687374745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ea8b100-1067-11ee-aaa6-7f821bc3777a
+
+
+
diff --git a/graph/incidents_graphml/8/8eb30680-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/8/8eb30680-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2a35b38450d1212061a7083f96299983059d7e8
--- /dev/null
+++ b/graph/incidents_graphml/8/8eb30680-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684942505
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8eb30680-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/8/8ec76e10-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8ec76e10-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83fa614bd0e88f957be7ff8cd176047a61956242
--- /dev/null
+++ b/graph/incidents_graphml/8/8ec76e10-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.246
+ 100.64.51.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8ec76e10-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8eca3800-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/8/8eca3800-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..784295afbbe913aa052395e2309a45dfb1c907e7
--- /dev/null
+++ b/graph/incidents_graphml/8/8eca3800-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8eca3800-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/8/8ecadf00-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/8/8ecadf00-1067-11ee-aaa6-7f821bc3777a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30262310abaedfde3088b95795376392f52819f9
--- /dev/null
+++ b/graph/incidents_graphml/8/8ecadf00-1067-11ee-aaa6-7f821bc3777a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.20
+ 100.64.59.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687374745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ecadf00-1067-11ee-aaa6-7f821bc3777a
+
+
+
diff --git a/graph/incidents_graphml/8/8ed70670-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8ed70670-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41077a4b7f658679f5733c75f74b9eddd3d995cc
--- /dev/null
+++ b/graph/incidents_graphml/8/8ed70670-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.146
+ 100.64.21.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8ed70670-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8ed89d20-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/8/8ed89d20-4522-11ef-b505-f5f313488713.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf5f20e3ab63627b74b2ac9599d278df92fe083f
--- /dev/null
+++ b/graph/incidents_graphml/8/8ed89d20-4522-11ef-b505-f5f313488713.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.70.181
+ USER-0015-2024.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.14
+ 100.64.89.14
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721320020
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ed89d20-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320020
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ed89d20-4522-11ef-b505-f5f313488713
+
+
+
diff --git a/graph/incidents_graphml/8/8edc0030-3c10-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/8/8edc0030-3c10-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fff5c3f1f1b83bb76bfd871727c510bf80fee5fa
--- /dev/null
+++ b/graph/incidents_graphml/8/8edc0030-3c10-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.203
+ 100.64.68.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edc0030-3c10-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/8/8ede72a0-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/8/8ede72a0-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33a57532c9b2325eca76e4d6409dd4e9b7e6c765
--- /dev/null
+++ b/graph/incidents_graphml/8/8ede72a0-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.94
+ 100.64.54.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460285
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ede72a0-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/8/8edf36d0-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8edf36d0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a7cad183ffcbeada77771f46f0a0f3738b11548
--- /dev/null
+++ b/graph/incidents_graphml/8/8edf36d0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.10
+ 100.64.8.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8edf36d0-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8ee3fec0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8ee3fec0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..382523b034a53e1b1440324bd4b722d66dfd5ab0
--- /dev/null
+++ b/graph/incidents_graphml/8/8ee3fec0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.146
+ 100.64.21.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ee3fec0-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8ee4e120-21f6-11ee-910a-0b067d3bfd22.graphml b/graph/incidents_graphml/8/8ee4e120-21f6-11ee-910a-0b067d3bfd22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee3b4eda59f2c46d7e8efb38335ebdeb3751f2dd
--- /dev/null
+++ b/graph/incidents_graphml/8/8ee4e120-21f6-11ee-910a-0b067d3bfd22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.246
+ 100.64.51.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689305333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8ee4e120-21f6-11ee-910a-0b067d3bfd22
+
+
+
diff --git a/graph/incidents_graphml/8/8eea1c10-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/8/8eea1c10-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..030dcd7950c114094a5d463992bc95fbf3d0579d
--- /dev/null
+++ b/graph/incidents_graphml/8/8eea1c10-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684942506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8eea1c10-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/8/8eeeee40-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8eeeee40-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d3cd6339eed9cb8941cdc54f1e5123809ff591c
--- /dev/null
+++ b/graph/incidents_graphml/8/8eeeee40-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.10
+ 100.64.8.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8eeeee40-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8ef05ad0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8ef05ad0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7de037bf19a78088e5fdc68e43e6059f4b38b67
--- /dev/null
+++ b/graph/incidents_graphml/8/8ef05ad0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.119
+ 100.64.47.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8ef05ad0-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8efc5bc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8efc5bc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce3e77adaf1be3cb2e91247ec19013516c114ce1
--- /dev/null
+++ b/graph/incidents_graphml/8/8efc5bc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.5
+ 100.64.25.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8efc5bc0-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8efda140-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8efda140-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3234b23cee7947b6415795ea76297c64e8378e24
--- /dev/null
+++ b/graph/incidents_graphml/8/8efda140-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.119
+ 100.64.47.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8efda140-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8efe5d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8efe5d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9146e1a847d77b0b0e46611938d8ccfb135e7301
--- /dev/null
+++ b/graph/incidents_graphml/8/8efe5d40-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.173
+ 100.64.20.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506144
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8efe5d40-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8efee6b0-614d-11ee-82b9-21d9d71c2fa4.graphml b/graph/incidents_graphml/8/8efee6b0-614d-11ee-82b9-21d9d71c2fa4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3873bb1911b05f484f23b1ff26144770c5a55745
--- /dev/null
+++ b/graph/incidents_graphml/8/8efee6b0-614d-11ee-82b9-21d9d71c2fa4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.188
+ 100.64.69.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696269623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8efee6b0-614d-11ee-82b9-21d9d71c2fa4
+
+
+
diff --git a/graph/incidents_graphml/8/8f08dee0-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8f08dee0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f73c7243f89dc509db09429b237ee9b279841bd2
--- /dev/null
+++ b/graph/incidents_graphml/8/8f08dee0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f08dee0-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8f12dcf0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8f12dcf0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e08c7f63ba5cb3559b3668e27a897bc173e5b2c4
--- /dev/null
+++ b/graph/incidents_graphml/8/8f12dcf0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.188
+ 100.64.51.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829126
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f12dcf0-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8f1a6b10-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8f1a6b10-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae054786a088e9cd71cbceabbbfae83b30f26c14
--- /dev/null
+++ b/graph/incidents_graphml/8/8f1a6b10-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8f1a6b10-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8f229460-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8f229460-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36dba899adc3ead9ede9dae794cc8f6f9f1cbd51
--- /dev/null
+++ b/graph/incidents_graphml/8/8f229460-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.188
+ 100.64.51.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829126
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8f229460-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8f25dcc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8f25dcc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8db822eff70fa9651f9fc36f2e2e3d33a0be1a64
--- /dev/null
+++ b/graph/incidents_graphml/8/8f25dcc0-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.255
+ 100.64.9.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f25dcc0-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8f268980-cfae-11ed-af5c-add420053dc4.graphml b/graph/incidents_graphml/8/8f268980-cfae-11ed-af5c-add420053dc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4601add4f83a30501309f46fddf67aad6a5c0959
--- /dev/null
+++ b/graph/incidents_graphml/8/8f268980-cfae-11ed-af5c-add420053dc4.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.245
+ 100.64.56.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.18.74
+ 100.64.18.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+ INCIDENT_LINK
+ 1680258415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f268980-cfae-11ed-af5c-add420053dc4
+
+
+
diff --git a/graph/incidents_graphml/8/8f316170-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8f316170-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48099255a6d31afcc900436bde6fdddff517a040
--- /dev/null
+++ b/graph/incidents_graphml/8/8f316170-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829126
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f316170-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8f3408e0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/8/8f3408e0-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03eb6f49f5d4659cb28a8fca56464d8e799f3460
--- /dev/null
+++ b/graph/incidents_graphml/8/8f3408e0-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.107
+ 100.64.17.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f3408e0-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/8/8f340ce0-1711-11ee-87cc-f345d7566905.graphml b/graph/incidents_graphml/8/8f340ce0-1711-11ee-87cc-f345d7566905.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c74393a8511c08d55c7cba4496e63c3e54ecbee7
--- /dev/null
+++ b/graph/incidents_graphml/8/8f340ce0-1711-11ee-87cc-f345d7566905.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.196
+ 100.64.77.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.204.225
+ 192.168.204.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.77.197
+ 100.64.77.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688107468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f340ce0-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f340ce0-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f340ce0-1711-11ee-87cc-f345d7566905
+
+
+ INCIDENT_LINK
+ 1688107468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f340ce0-1711-11ee-87cc-f345d7566905
+
+
+
diff --git a/graph/incidents_graphml/8/8f3b0dc0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/8/8f3b0dc0-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64f8244aa4aef6ca911bfcdab4c6925400c5fde9
--- /dev/null
+++ b/graph/incidents_graphml/8/8f3b0dc0-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.107
+ 100.64.17.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8f3b0dc0-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/8/8f3baeb0-0c8d-11ef-a421-bb714b96b7ea.graphml b/graph/incidents_graphml/8/8f3baeb0-0c8d-11ef-a421-bb714b96b7ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4855220afd27ed0de624a8c064c0bda621bcdf35
--- /dev/null
+++ b/graph/incidents_graphml/8/8f3baeb0-0c8d-11ef-a421-bb714b96b7ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.191
+ 100.64.67.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715098760
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f3baeb0-0c8d-11ef-a421-bb714b96b7ea
+
+
+
diff --git a/graph/incidents_graphml/8/8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/8/8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a40fd60383d2dbbebf74b7205d5094603478faa
--- /dev/null
+++ b/graph/incidents_graphml/8/8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.124
+ 100.64.81.124
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490641
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+ INCIDENT_LINK
+ 1681490641
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+ INCIDENT_LINK
+ 1681490641
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f3bdd90-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/8/8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44.graphml b/graph/incidents_graphml/8/8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ed1e0ea4e7fab9a7cd64e2a4e31c5d305d0e4fd
--- /dev/null
+++ b/graph/incidents_graphml/8/8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.109
+ 100.64.37.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.110
+ 100.64.37.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.111
+ 100.64.37.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.112
+ 100.64.37.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.113
+ 100.64.37.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.170
+ 100.64.3.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.32
+ 100.64.22.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.100
+ 100.64.24.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.67
+ 100.64.16.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.254
+ 100.64.9.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.115
+ 100.64.37.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.116
+ 100.64.37.116
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.169
+ 100.64.14.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.184
+ 100.64.15.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.117
+ 100.64.37.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815687
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f40ba30-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+
diff --git a/graph/incidents_graphml/8/8f422a50-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8f422a50-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42dfadfa6c24fd6dfd6770bbf597d47751093b8e
--- /dev/null
+++ b/graph/incidents_graphml/8/8f422a50-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829126
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8f422a50-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8f452490-6b6b-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/8/8f452490-6b6b-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12a572c59bf0a3c2a11dc693fa4533741a3f1574
--- /dev/null
+++ b/graph/incidents_graphml/8/8f452490-6b6b-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.90
+ 100.64.12.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f452490-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+ INCIDENT_LINK
+ 1697382020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f452490-6b6b-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/8/8f4557a0-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8f4557a0-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f28b443c13f2ebb2ebed01fba3b41df1b22ed59b
--- /dev/null
+++ b/graph/incidents_graphml/8/8f4557a0-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.12
+ 100.64.38.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862197
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f4557a0-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8f4928a0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/8/8f4928a0-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..499c9854abfde1cd1118184a834c9752f7d56405
--- /dev/null
+++ b/graph/incidents_graphml/8/8f4928a0-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.37
+ 100.64.62.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f4928a0-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/8/8f544bc0-6fc9-11ee-9ae8-5ba4cc946389.graphml b/graph/incidents_graphml/8/8f544bc0-6fc9-11ee-9ae8-5ba4cc946389.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd656d034adb813c0dec729e228407d1c7c4d6e5
--- /dev/null
+++ b/graph/incidents_graphml/8/8f544bc0-6fc9-11ee-9ae8-5ba4cc946389.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.12
+ 100.64.38.12
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697862197
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f544bc0-6fc9-11ee-9ae8-5ba4cc946389
+
+
+
diff --git a/graph/incidents_graphml/8/8f6e3890-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/8/8f6e3890-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d55fc6e906c59755b1d6c7e4097d82d34ab46e6
--- /dev/null
+++ b/graph/incidents_graphml/8/8f6e3890-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.121
+ 100.64.32.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976582
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8f6e3890-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/8/8f795360-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8f795360-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8ecfbd29a388adc4ada537a39fed6131e73800b
--- /dev/null
+++ b/graph/incidents_graphml/8/8f795360-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.249
+ 100.64.39.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139653
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8f795360-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8f7f7040-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/8/8f7f7040-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..201c8b9360e9cf640e4204d2eecf0d7719d1a5e7
--- /dev/null
+++ b/graph/incidents_graphml/8/8f7f7040-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.151
+ 100.64.72.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.153
+ 100.64.72.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.154
+ 100.64.72.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8f7f7040-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/8/8f890ad0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/8/8f890ad0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c4bf64f4fc61d4b6be08d9af8c67e264a1812bf
--- /dev/null
+++ b/graph/incidents_graphml/8/8f890ad0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.249
+ 100.64.39.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139653
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f890ad0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/8/8f917310-a061-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/8/8f917310-a061-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..448deaf912a3baa0eef75eb77a0b4dbe34cd6145
--- /dev/null
+++ b/graph/incidents_graphml/8/8f917310-a061-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,97 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.44
+ 100.64.68.44
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1703205137
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 8f917310-a061-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703205137
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 8f917310-a061-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703205137
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 8f917310-a061-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/8/8f925c00-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/8/8f925c00-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be6b08ecd65541c670f0778f0c75e9b6650a3cf0
--- /dev/null
+++ b/graph/incidents_graphml/8/8f925c00-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f925c00-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8f925c00-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/8/8fb55e80-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8fb55e80-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f488a53dd4760811832597f1bcb23d74eed79d5
--- /dev/null
+++ b/graph/incidents_graphml/8/8fb55e80-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829127
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8fb55e80-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8fc2f310-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/8/8fc2f310-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..379d07a2e512b2899a40e9cd9cb3035f0765cead
--- /dev/null
+++ b/graph/incidents_graphml/8/8fc2f310-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829127
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8fc2f310-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/8/8fd27620-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8fd27620-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20855d9f572fda937c6c9f198012c70173e28ccb
--- /dev/null
+++ b/graph/incidents_graphml/8/8fd27620-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.175
+ 100.64.20.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fd27620-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8fd62dc0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/8/8fd62dc0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88a6f97e8b736dabc52a417f22e7a346f0ae09b4
--- /dev/null
+++ b/graph/incidents_graphml/8/8fd62dc0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.67
+ 100.64.26.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8fd62dc0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/8/8fdbd730-3f35-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/8/8fdbd730-3f35-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ecd4b9f10d896c8752a13f1918a8bb56d1570d0
--- /dev/null
+++ b/graph/incidents_graphml/8/8fdbd730-3f35-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.247
+ 100.64.6.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692520977
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fdbd730-3f35-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/8/8fe14550-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/8/8fe14550-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa48aa16464d4e11e7d23c2b5cb6ab63246e9fa3
--- /dev/null
+++ b/graph/incidents_graphml/8/8fe14550-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.125
+ 100.64.81.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fe14550-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/8/8fe45fe0-186b-11ee-8c84-93114531ae02.graphml b/graph/incidents_graphml/8/8fe45fe0-186b-11ee-8c84-93114531ae02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e757ada200c5825bc8b8f8d21e53d5a83ddcc73
--- /dev/null
+++ b/graph/incidents_graphml/8/8fe45fe0-186b-11ee-8c84-93114531ae02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1688256074
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fe45fe0-186b-11ee-8c84-93114531ae02
+
+
+
diff --git a/graph/incidents_graphml/8/8fe7d500-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/8/8fe7d500-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5152381e565b497629e475e579ab49baf6be7c05
--- /dev/null
+++ b/graph/incidents_graphml/8/8fe7d500-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.81.125
+ 100.64.81.125
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681490642
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8fe7d500-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/8/8feac880-186b-11ee-8c84-93114531ae02.graphml b/graph/incidents_graphml/8/8feac880-186b-11ee-8c84-93114531ae02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fefcbf634e064d9838beeaee80061785b40159e2
--- /dev/null
+++ b/graph/incidents_graphml/8/8feac880-186b-11ee-8c84-93114531ae02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8feac880-186b-11ee-8c84-93114531ae02
+
+
+
diff --git a/graph/incidents_graphml/8/8feb0730-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/8/8feb0730-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d717b49f75cb7f12ac74f3899aea48b25148381c
--- /dev/null
+++ b/graph/incidents_graphml/8/8feb0730-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.175
+ 100.64.20.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8feb0730-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/8/8feb6790-3f35-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/8/8feb6790-3f35-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22410be5660507696e50d00418b2965d0a7b7105
--- /dev/null
+++ b/graph/incidents_graphml/8/8feb6790-3f35-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.247
+ 100.64.6.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692520977
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8feb6790-3f35-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/8/8fee7200-186b-11ee-8c84-93114531ae02.graphml b/graph/incidents_graphml/8/8fee7200-186b-11ee-8c84-93114531ae02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dc0181df0c6cadaba3dc683a6b3037f15e3a2c6
--- /dev/null
+++ b/graph/incidents_graphml/8/8fee7200-186b-11ee-8c84-93114531ae02.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fee7200-186b-11ee-8c84-93114531ae02
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fee7200-186b-11ee-8c84-93114531ae02
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fee7200-186b-11ee-8c84-93114531ae02
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8fee7200-186b-11ee-8c84-93114531ae02
+
+
+
diff --git a/graph/incidents_graphml/8/8ff54fd0-186b-11ee-8c84-93114531ae02.graphml b/graph/incidents_graphml/8/8ff54fd0-186b-11ee-8c84-93114531ae02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cbbbaf9d1c5c4211436ca1287aba8fee17703cb
--- /dev/null
+++ b/graph/incidents_graphml/8/8ff54fd0-186b-11ee-8c84-93114531ae02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1688256075
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8ff54fd0-186b-11ee-8c84-93114531ae02
+
+
+
diff --git a/graph/incidents_graphml/8/8ff59ca0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/8/8ff59ca0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4241deb52cca851741d84c1f295cd745f52fb209
--- /dev/null
+++ b/graph/incidents_graphml/8/8ff59ca0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.67
+ 100.64.26.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071093
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 8ff59ca0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/9011c280-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/9011c280-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..833d699f3d111f51c4c3782546d711dd88fd115d
--- /dev/null
+++ b/graph/incidents_graphml/9/9011c280-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.96
+ 100.64.54.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460287
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9011c280-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/9018fbe0-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/9/9018fbe0-1d36-11ee-9ab6-a3b5d64e58f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4e893b0096cbb78affb911362294cd90a483ee3
--- /dev/null
+++ b/graph/incidents_graphml/9/9018fbe0-1d36-11ee-9ab6-a3b5d64e58f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.107
+ 100.64.45.107
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688783067
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9018fbe0-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+
diff --git a/graph/incidents_graphml/9/901ac980-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/9/901ac980-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8701eeb9a803d749f906a972fdc28afee9189fa4
--- /dev/null
+++ b/graph/incidents_graphml/9/901ac980-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,639 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.113
+ 100.64.53.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.177
+ 100.64.29.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.247
+ 100.64.20.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.219
+ 100.64.18.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.114
+ 100.64.53.114
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.115
+ 100.64.53.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.116
+ 100.64.53.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.117
+ 100.64.53.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.217
+ 100.64.24.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.118
+ 100.64.53.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.119
+ 100.64.53.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.120
+ 100.64.53.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.52
+ 100.64.51.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.121
+ 100.64.53.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.172
+ 100.64.19.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.122
+ 100.64.53.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 901ac980-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/9/901bbb70-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/901bbb70-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a72e26e56a118d60760417311849876b27a9e9a2
--- /dev/null
+++ b/graph/incidents_graphml/9/901bbb70-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 901bbb70-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/90254270-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/90254270-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..110b40a9dcb6695668dd0d5cde9b8bc3c28c98e7
--- /dev/null
+++ b/graph/incidents_graphml/9/90254270-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.214.176.26
+ 10.214.176.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.69
+ 100.64.74.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch","FireEye Endpoint Security (HX Series)"]
+
+
+ INCIDENT_LINK
+ 1685797636
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90254270-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797636
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90254270-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/9/90307690-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/90307690-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3f4a8981517c9e889128046f20b5dc9d132931e
--- /dev/null
+++ b/graph/incidents_graphml/9/90307690-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.179
+ 100.64.18.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.180
+ 100.64.18.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.181
+ 100.64.18.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.182
+ 100.64.18.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.183
+ 100.64.18.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.184
+ 100.64.18.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.185
+ 100.64.18.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.64
+ 100.64.15.64
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.186
+ 100.64.18.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.187
+ 100.64.18.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.188
+ 100.64.18.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.209
+ 100.64.11.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.189
+ 100.64.18.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.190
+ 100.64.18.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.191
+ 100.64.18.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.104
+ 100.64.3.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.118
+ 100.64.12.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.192
+ 100.64.18.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849314
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90307690-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/9/9030a900-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/9030a900-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21f40fa5df3338a1348bd37435bd05396e0ad302
--- /dev/null
+++ b/graph/incidents_graphml/9/9030a900-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.190
+ 100.64.51.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829128
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9030a900-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/90343550-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/9/90343550-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44ae931b197c9eb47f8d93523842b826db83eb6c
--- /dev/null
+++ b/graph/incidents_graphml/9/90343550-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.254
+ 100.64.67.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90343550-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/9/90380f30-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/90380f30-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05868182c0e2c0e16cc82196461a70d356a5b0c5
--- /dev/null
+++ b/graph/incidents_graphml/9/90380f30-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.233
+ 100.64.26.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460287
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90380f30-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/90395520-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/9/90395520-1d36-11ee-9ab6-a3b5d64e58f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0ff8a774593d9cc985941155e524c9b4d7c6627
--- /dev/null
+++ b/graph/incidents_graphml/9/90395520-1d36-11ee-9ab6-a3b5d64e58f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.45.107
+ 100.64.45.107
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688783068
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90395520-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+
diff --git a/graph/incidents_graphml/9/903bfec0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/903bfec0-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2abe62311d518c6683e277825388ac0c92417d0
--- /dev/null
+++ b/graph/incidents_graphml/9/903bfec0-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.21
+ 100.64.13.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 903bfec0-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/90406070-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/90406070-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5e52194617c497f2651b69397eb922ad817ed10
--- /dev/null
+++ b/graph/incidents_graphml/9/90406070-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.190
+ 100.64.51.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829128
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90406070-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/904d9300-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/904d9300-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fb60eb79da74f0601cc6425228e352fda6e81bc
--- /dev/null
+++ b/graph/incidents_graphml/9/904d9300-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.233
+ 100.64.26.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460287
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 904d9300-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/90506fe0-00a1-11ef-b5c2-73222c3b09d8.graphml b/graph/incidents_graphml/9/90506fe0-00a1-11ef-b5c2-73222c3b09d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c342e4292a983e4b437b130040a86a431c7f59a6
--- /dev/null
+++ b/graph/incidents_graphml/9/90506fe0-00a1-11ef-b5c2-73222c3b09d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.254
+ 100.64.67.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713787938
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90506fe0-00a1-11ef-b5c2-73222c3b09d8
+
+
+
diff --git a/graph/incidents_graphml/9/90518290-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/90518290-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83ceb17794608079fd69d97de1ef1eda49e96da0
--- /dev/null
+++ b/graph/incidents_graphml/9/90518290-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.21
+ 100.64.13.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90518290-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/905b7f90-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/905b7f90-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba63e76708ac96aa3e0530c23f211bc911bd24d0
--- /dev/null
+++ b/graph/incidents_graphml/9/905b7f90-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218550
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 905b7f90-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/9/906d47f0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/906d47f0-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15f20b13359430eba97cbd09dec6866ce012a403
--- /dev/null
+++ b/graph/incidents_graphml/9/906d47f0-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,525 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.23
+ 100.64.13.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.24
+ 100.64.13.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.12
+ 100.64.2.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.115
+ 100.64.4.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.25
+ 100.64.13.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.26
+ 100.64.13.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.27
+ 100.64.13.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.28
+ 100.64.13.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.29
+ 100.64.13.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 906d47f0-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/90785d30-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/90785d30-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..657b8eda14248b06fd12274a2fbf31d761472ce4
--- /dev/null
+++ b/graph/incidents_graphml/9/90785d30-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90785d30-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/9084a410-1cdf-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/9/9084a410-1cdf-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2a7cd1dc481e09420ad462bcb4a43ccaf3a134c
--- /dev/null
+++ b/graph/incidents_graphml/9/9084a410-1cdf-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.130
+ USER-0015-1629.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.49
+ 100.64.72.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660598204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9084a410-1cdf-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660598204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9084a410-1cdf-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/9/9085be40-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/9/9085be40-866f-11ee-8f03-878f88d78f03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67f84840e2eb7a2b743d75c3d8aa45321d2d7b4b
--- /dev/null
+++ b/graph/incidents_graphml/9/9085be40-866f-11ee-8f03-878f88d78f03.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.196
+ 100.64.69.196
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ HOST
+ 100.64.69.197
+ 100.64.69.197
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1700352421
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9085be40-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352421
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9085be40-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352421
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9085be40-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352421
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9085be40-866f-11ee-8f03-878f88d78f03
+
+
+
diff --git a/graph/incidents_graphml/9/90902980-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/90902980-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a216d26f35d69b3335300a030d21ca0dc5baeba3
--- /dev/null
+++ b/graph/incidents_graphml/9/90902980-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.68
+ 100.64.52.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684999632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90902980-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/909b4e80-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/909b4e80-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a884d78b5ebc86be6c47dc550eccfd9c720ee621
--- /dev/null
+++ b/graph/incidents_graphml/9/909b4e80-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.126
+ 100.64.2.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942509
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 909b4e80-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/90a92fd0-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/9/90a92fd0-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2212e09db4d11b329eb9729bae73ee9f48993cfd
--- /dev/null
+++ b/graph/incidents_graphml/9/90a92fd0-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.48
+ 100.64.37.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826884
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90a92fd0-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/9/90a96d30-3c10-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/9/90a96d30-3c10-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..430d79d8fc46611aea48658a65a66271cb60f9a6
--- /dev/null
+++ b/graph/incidents_graphml/9/90a96d30-3c10-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.13.57
+ 100.64.13.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175233
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90a96d30-3c10-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/9/90b3bbb0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/90b3bbb0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1d160038066c1a04f0dd777cef63bc6783f9168
--- /dev/null
+++ b/graph/incidents_graphml/9/90b3bbb0-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.191
+ 100.64.51.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90b3bbb0-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/90b6bed0-11e2-11ed-a61c-af3dfba5797b.graphml b/graph/incidents_graphml/9/90b6bed0-11e2-11ed-a61c-af3dfba5797b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..125b862d31ce7efb4b0aacf76b1d9741202d5974
--- /dev/null
+++ b/graph/incidents_graphml/9/90b6bed0-11e2-11ed-a61c-af3dfba5797b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.78
+ 100.64.72.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.79
+ 100.64.72.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659390030
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90b6bed0-11e2-11ed-a61c-af3dfba5797b
+
+
+
diff --git a/graph/incidents_graphml/9/90c12930-6f7c-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/90c12930-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94ec79869d3c81d9797f9e554229b13726aaad33
--- /dev/null
+++ b/graph/incidents_graphml/9/90c12930-6f7c-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.191
+ 100.64.51.191
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697829129
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90c12930-6f7c-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/90c5d670-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/90c5d670-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a52501beda515bc905d1499546dd9c0f8a5a90bc
--- /dev/null
+++ b/graph/incidents_graphml/9/90c5d670-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.58
+ 100.64.77.58
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90c5d670-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/90c6a2e0-93d8-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/9/90c6a2e0-93d8-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..539ed47a6e59ed3de96c2cd16ce5ba5c62dff3d1
--- /dev/null
+++ b/graph/incidents_graphml/9/90c6a2e0-93d8-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701826884
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90c6a2e0-93d8-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/9/90c8a010-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/90c8a010-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..686bf6d0ea04acbb6fc280716623511957595fdd
--- /dev/null
+++ b/graph/incidents_graphml/9/90c8a010-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.2.126
+ 100.64.2.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684942509
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90c8a010-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/90d4e5e0-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/9/90d4e5e0-2824-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82f25b4b13bdcf08db5a2f270ce0cef4ff9a5b28
--- /dev/null
+++ b/graph/incidents_graphml/9/90d4e5e0-2824-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.128.67
+ 172.21.128.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.86.165
+ 100.64.86.165
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1718132298
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90d4e5e0-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132298
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 90d4e5e0-2824-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/9/90db6350-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/90db6350-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d89cfd3b2919523e405c4c03013dc24a7240bf1a
--- /dev/null
+++ b/graph/incidents_graphml/9/90db6350-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.57
+ 100.64.52.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684999632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90db6350-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/90e23810-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/90e23810-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..952a82f6a213ffaa299f96c12646d36d9904f425
--- /dev/null
+++ b/graph/incidents_graphml/9/90e23810-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 90e23810-0d0b-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 90e23810-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/90e31410-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/9/90e31410-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00628799db5d0c97bd75a90663b6b4b9aa9fa6e4
--- /dev/null
+++ b/graph/incidents_graphml/9/90e31410-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.246
+ 100.64.66.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90e31410-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/9/90e7ddc0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/9/90e7ddc0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7abcb62a2f4f564d9f88a4c3604e6342b7f7ac39
--- /dev/null
+++ b/graph/incidents_graphml/9/90e7ddc0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.177
+ 100.64.20.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506147
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90e7ddc0-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/9/90f0f6c0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/9/90f0f6c0-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..443ba7b1923ad1028516cfd49c38bdf0606a2e5a
--- /dev/null
+++ b/graph/incidents_graphml/9/90f0f6c0-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.246
+ 100.64.66.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145869
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90f0f6c0-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/9/90f76dc0-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/90f76dc0-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..422fa4ffaa00266cdfe493cc96e8b5f57f81b58c
--- /dev/null
+++ b/graph/incidents_graphml/9/90f76dc0-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.61
+ 100.64.77.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 90f76dc0-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/90f7ec00-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/90f7ec00-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c229ed8f36af674247a84da7f1adb4a0c400dc60
--- /dev/null
+++ b/graph/incidents_graphml/9/90f7ec00-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.52.57
+ 100.64.52.57
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684999632
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 90f7ec00-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/90f9ffa0-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/90f9ffa0-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3acd45a4e41efed4d584aeeb27cab2b235280815
--- /dev/null
+++ b/graph/incidents_graphml/9/90f9ffa0-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 90f9ffa0-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/910a4830-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/910a4830-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00f38f4e680fc66af8a6d993c493be06a67e64cd
--- /dev/null
+++ b/graph/incidents_graphml/9/910a4830-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.164
+ 100.64.75.164
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 910a4830-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/91115b00-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/91115b00-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df46df3457a139782304beec6d517869d0b07efc
--- /dev/null
+++ b/graph/incidents_graphml/9/91115b00-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.202
+ 100.64.41.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430224
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91115b00-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/91127850-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/9/91127850-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..712d8b92841182f1cf25ab55520f0dbaac26a44e
--- /dev/null
+++ b/graph/incidents_graphml/9/91127850-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.31
+ 100.64.82.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91127850-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91127850-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91127850-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91127850-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9113cf60-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9113cf60-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3eaa11bc5b1f8a9035c425e165518aae07d8d57d
--- /dev/null
+++ b/graph/incidents_graphml/9/9113cf60-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.61
+ 100.64.77.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9113cf60-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/911c70a0-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/911c70a0-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8d405515bd84b239e1c44d6fde27f8545288dc1
--- /dev/null
+++ b/graph/incidents_graphml/9/911c70a0-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.164
+ 100.64.75.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 911c70a0-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/91211270-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/91211270-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2e09d73edc3974485bd23ed776264f2b54a306d
--- /dev/null
+++ b/graph/incidents_graphml/9/91211270-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.202
+ 100.64.41.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91211270-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/91253d90-facd-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/91253d90-facd-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92327a4ca18f28798bc23c46b16846138fdbfc15
--- /dev/null
+++ b/graph/incidents_graphml/9/91253d90-facd-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.52.70
+ 100.64.52.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684999633
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91253d90-facd-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/9127fc20-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/9/9127fc20-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dad913dccc24f858f90b44b05a70770a5778bc92
--- /dev/null
+++ b/graph/incidents_graphml/9/9127fc20-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1912.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Umbrella","Meraki"]
+
+
+ HOST
+ 100.64.20.216
+ 100.64.20.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9127fc20-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9127fc20-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9129c860-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9129c860-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c98a21ad9208007540d29e65d1fd01315a9307c
--- /dev/null
+++ b/graph/incidents_graphml/9/9129c860-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.62
+ 100.64.77.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9129c860-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/912f4980-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/912f4980-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61badfce80390972e691bb72737d3f641ef91236
--- /dev/null
+++ b/graph/incidents_graphml/9/912f4980-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.230
+ 100.64.10.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 912f4980-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9137bc40-a8b5-11ee-9cbd-9528e17aa15f.graphml b/graph/incidents_graphml/9/9137bc40-a8b5-11ee-9cbd-9528e17aa15f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6333c141dd0cfa60e78b9833e9cee2e47f70650b
--- /dev/null
+++ b/graph/incidents_graphml/9/9137bc40-a8b5-11ee-9cbd-9528e17aa15f.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.252
+ 100.64.65.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.73
+ 100.64.54.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.71
+ 100.64.31.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.253
+ 100.64.65.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.172
+ 100.64.51.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+ INCIDENT_LINK
+ 1704120827
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9137bc40-a8b5-11ee-9cbd-9528e17aa15f
+
+
+
diff --git a/graph/incidents_graphml/9/91385d10-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/91385d10-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e29c5033c994f0edeb09e8ce2f47b22d87bd750
--- /dev/null
+++ b/graph/incidents_graphml/9/91385d10-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.168
+ 100.64.75.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.21.75
+ 100.64.21.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.169
+ 100.64.75.169
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.170
+ 100.64.75.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91385d10-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/913a37c0-561f-11ed-90b9-dd5c5c82d817.graphml b/graph/incidents_graphml/9/913a37c0-561f-11ed-90b9-dd5c5c82d817.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea01c3168b6dd7f532358e7c7353659a624b64d9
--- /dev/null
+++ b/graph/incidents_graphml/9/913a37c0-561f-11ed-90b9-dd5c5c82d817.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.117
+ 100.64.95.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666892909
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 913a37c0-561f-11ed-90b9-dd5c5c82d817
+
+
+ INCIDENT_LINK
+ 1666892909
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 913a37c0-561f-11ed-90b9-dd5c5c82d817
+
+
+
diff --git a/graph/incidents_graphml/9/914394d0-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/914394d0-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d535d4cac051d7c3b0745d6706f578dd0cafd2b
--- /dev/null
+++ b/graph/incidents_graphml/9/914394d0-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.230
+ 100.64.10.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 914394d0-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9144a360-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9144a360-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91789b5a94e40f1adc7e3dc995ed7c35f7ccbd22
--- /dev/null
+++ b/graph/incidents_graphml/9/9144a360-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.62
+ 100.64.77.62
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687005382
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9144a360-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/914ad3a0-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/914ad3a0-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c581ad3666ca9183d087fed6f0b68565b49ec13
--- /dev/null
+++ b/graph/incidents_graphml/9/914ad3a0-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.50
+ 100.64.71.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 914ad3a0-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/914e27c0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/914e27c0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed67131e8eec4f92a49703d3d8a46cf8e2043e4d
--- /dev/null
+++ b/graph/incidents_graphml/9/914e27c0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.203
+ 100.64.35.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 914e27c0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/9155d970-2fea-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/9/9155d970-2fea-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78b52ab519198d82c25ac8bd16a9474584e3996d
--- /dev/null
+++ b/graph/incidents_graphml/9/9155d970-2fea-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.20.96.237
+ USER-0015-2081.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1718986998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9155d970-2fea-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/9/91593ed0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/91593ed0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63704b2122addb39de3bf213c4d112cd8d44bba9
--- /dev/null
+++ b/graph/incidents_graphml/9/91593ed0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.215
+ USER-0015-1236.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91593ed0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/915f1720-1b82-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/9/915f1720-1b82-11ed-9931-5799b48b5de2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..250079c76f1cf7d4fbbdebf4efdb1aec04255a63
--- /dev/null
+++ b/graph/incidents_graphml/9/915f1720-1b82-11ed-9931-5799b48b5de2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.20
+ 100.64.74.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660448311
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 915f1720-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448311
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 915f1720-1b82-11ed-9931-5799b48b5de2
+
+
+
diff --git a/graph/incidents_graphml/9/915f1ef0-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/915f1ef0-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26ca4c4262724446cf7564baaf96a13026442fdf
--- /dev/null
+++ b/graph/incidents_graphml/9/915f1ef0-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.50
+ 100.64.71.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 915f1ef0-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/9168a820-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9168a820-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d205251303e0ab45130cbe461dd2b7db57280bc3
--- /dev/null
+++ b/graph/incidents_graphml/9/9168a820-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.215
+ USER-0015-1236.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9168a820-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/91695a80-9a2d-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/9/91695a80-9a2d-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9c20aa651cea402a07b3f57169c6350cf2ed1ae
--- /dev/null
+++ b/graph/incidents_graphml/9/91695a80-9a2d-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.9
+ 100.64.96.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674375602
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91695a80-9a2d-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/9/91728240-9a2d-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/9/91728240-9a2d-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5aa2567f4fd58caedcb0524c428aa024fb261bf9
--- /dev/null
+++ b/graph/incidents_graphml/9/91728240-9a2d-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 100.64.84.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.11
+ 100.64.96.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674375602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 91728240-9a2d-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/9/91734330-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/91734330-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e3ceb8e5670b651d891d1e249759da5b3c339ea
--- /dev/null
+++ b/graph/incidents_graphml/9/91734330-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.226
+ 100.64.70.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91734330-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/91763cb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/91763cb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecd812ed1b67e2f13052db752e38f6391963b1ae
--- /dev/null
+++ b/graph/incidents_graphml/9/91763cb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.217
+ 100.64.22.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91763cb0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/91765e60-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/91765e60-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fada6942c76369ca38e40ed05a3b20aa987a6453
--- /dev/null
+++ b/graph/incidents_graphml/9/91765e60-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.67
+ 100.64.8.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430224
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 91765e60-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/9177c850-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/9/9177c850-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04ed984a711235092f7771618519650189f211cf
--- /dev/null
+++ b/graph/incidents_graphml/9/9177c850-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.72
+ USER-0015-1464.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777618
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9177c850-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/9/917f70f0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/917f70f0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fb77d8a3fd6730ec87b497389f45cfc86067dbf
--- /dev/null
+++ b/graph/incidents_graphml/9/917f70f0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.203
+ 100.64.35.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 917f70f0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/91837230-9a2d-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/9/91837230-9a2d-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7e76e7de0680ea43b16b811cbd905e16e5c378a
--- /dev/null
+++ b/graph/incidents_graphml/9/91837230-9a2d-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.36.138
+ 100.64.36.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674375602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 91837230-9a2d-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/9/9186b770-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9186b770-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b24a4e8edc0787911e96b4dfdabd962a8a29845
--- /dev/null
+++ b/graph/incidents_graphml/9/9186b770-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.217
+ 100.64.22.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9186b770-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/91870030-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/91870030-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56b8b55e3a82a87d05747e7dd9ee4a61bd3b3315
--- /dev/null
+++ b/graph/incidents_graphml/9/91870030-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.67
+ 100.64.8.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430224
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91870030-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/91882d20-9a2d-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/9/91882d20-9a2d-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93685ec58978783b26aef7559f9920cc381a6eeb
--- /dev/null
+++ b/graph/incidents_graphml/9/91882d20-9a2d-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.17
+ 100.64.96.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674375602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91882d20-9a2d-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/9/9188b1a0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml b/graph/incidents_graphml/9/9188b1a0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69f4845842ff0394e06e0bf4f5cceb7d9e311285
--- /dev/null
+++ b/graph/incidents_graphml/9/9188b1a0-6c8c-11ee-b36a-7b1fdfc2f80a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.179
+ 100.64.20.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697506148
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9188b1a0-6c8c-11ee-b36a-7b1fdfc2f80a
+
+
+
diff --git a/graph/incidents_graphml/9/9189b160-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/9189b160-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bc70f2ea242751e9eaec2bf297706386e5c46c4
--- /dev/null
+++ b/graph/incidents_graphml/9/9189b160-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.226
+ 100.64.70.226
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9189b160-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/918baf90-9a2d-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/9/918baf90-9a2d-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08d0677787ad39f081b7c7d9a8c5f7c35789b51b
--- /dev/null
+++ b/graph/incidents_graphml/9/918baf90-9a2d-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.17
+ 100.64.96.17
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674375602
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 918baf90-9a2d-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/9/9199ebf0-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/9199ebf0-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c47f0cd7a6d7cc88956643de7a51b5127e9853ea
--- /dev/null
+++ b/graph/incidents_graphml/9/9199ebf0-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.204
+ 100.64.41.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430225
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9199ebf0-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/919b27d0-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/919b27d0-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e6e9a213c185aa5472d2c6d638aa8a289f959ea
--- /dev/null
+++ b/graph/incidents_graphml/9/919b27d0-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.184
+ 100.64.74.184
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005383
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b27d0-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/919b3d90-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/919b3d90-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c794f06734c461c271b1c7146d8f459d6ad47b6
--- /dev/null
+++ b/graph/incidents_graphml/9/919b3d90-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.171
+ 100.64.75.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.98734375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.172
+ USER-0015-1721.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.173
+ 100.64.75.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.57.94
+ 100.64.57.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.54.27
+ 100.64.54.27
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1722.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 10.107.139.129
+ 10.107.139.129
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.174
+ 100.64.75.174
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ HOST-13815
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.175
+ 100.64.75.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.176
+ 100.64.75.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.178
+ 100.64.75.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.179
+ 100.64.75.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.160
+ HOST-13816
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.14.110
+ 100.64.14.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.180
+ 100.64.75.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.98734375
+ 0.98734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919b3d90-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/919cb8f0-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/919cb8f0-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..685a3e73bc709088463db957da939e6d8b101732
--- /dev/null
+++ b/graph/incidents_graphml/9/919cb8f0-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 919cb8f0-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/91a86f20-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/9/91a86f20-e560-11ee-be14-8bb84b2c14a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c74a6ffd7663349b9222d741c17efc804cbcf810
--- /dev/null
+++ b/graph/incidents_graphml/9/91a86f20-e560-11ee-be14-8bb84b2c14a8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.131
+ 100.64.42.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.94
+ 100.64.68.94
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710791341
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91a86f20-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791341
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91a86f20-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791341
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91a86f20-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791341
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91a86f20-e560-11ee-be14-8bb84b2c14a8
+
+
+
diff --git a/graph/incidents_graphml/9/91a9dfe0-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91a9dfe0-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0edef186b528d3ebc05fc544054cd09d915a4c71
--- /dev/null
+++ b/graph/incidents_graphml/9/91a9dfe0-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.219
+ 100.64.85.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91a9dfe0-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91ae25a0-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91ae25a0-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..284f563c5ba2174292856bd1a513ca7278b4e0f6
--- /dev/null
+++ b/graph/incidents_graphml/9/91ae25a0-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91ae25a0-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91b09a50-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/91b09a50-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1375a80307020065de95ca12ed037fa3268c2eb7
--- /dev/null
+++ b/graph/incidents_graphml/9/91b09a50-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.23
+ 100.64.72.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91b09a50-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/91b4a340-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/91b4a340-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e878da4eb569c45f4e0fa05e335e4e5241fc2ec
--- /dev/null
+++ b/graph/incidents_graphml/9/91b4a340-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.184
+ 100.64.74.184
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687005383
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91b4a340-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/91b4dc60-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91b4dc60-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbc172841e41423210d2bcfa6f7eb2d8443dee31
--- /dev/null
+++ b/graph/incidents_graphml/9/91b4dc60-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91b4dc60-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91b77bd0-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/9/91b77bd0-3558-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..357b55ffb0f17d25bc45c8b068db34820cc8fb1f
--- /dev/null
+++ b/graph/incidents_graphml/9/91b77bd0-3558-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.112.183
+ USER-0015-2046.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.85
+ 100.64.90.85
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719583999
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91b77bd0-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583999
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91b77bd0-3558-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/9/91b793f0-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/91b793f0-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9731e140e64729db865e8f4b88a609fe7c3891f5
--- /dev/null
+++ b/graph/incidents_graphml/9/91b793f0-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684942510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91b793f0-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/91c4c5f0-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/91c4c5f0-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..740c4e39af6a2d4ba51f619fb01d5400681d3c23
--- /dev/null
+++ b/graph/incidents_graphml/9/91c4c5f0-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.125
+ 100.64.27.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 91c4c5f0-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/91c5a8f0-f930-11ed-a36e-b19a0b121d96.graphml b/graph/incidents_graphml/9/91c5a8f0-f930-11ed-a36e-b19a0b121d96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06d905369014e2e083998b6e4d918b8a0bf332b7
--- /dev/null
+++ b/graph/incidents_graphml/9/91c5a8f0-f930-11ed-a36e-b19a0b121d96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.23
+ 100.64.72.23
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1684822251
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91c5a8f0-f930-11ed-a36e-b19a0b121d96
+
+
+
diff --git a/graph/incidents_graphml/9/91ce45c0-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/91ce45c0-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6854f0a4851c0bb0a98667ac88f6f3bd11dfc9f8
--- /dev/null
+++ b/graph/incidents_graphml/9/91ce45c0-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.66
+ 100.64.77.66
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005383
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91ce45c0-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/91d4f290-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/91d4f290-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cf8015ce898f4e8fd61969f358cc32826019698
--- /dev/null
+++ b/graph/incidents_graphml/9/91d4f290-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.125
+ 100.64.27.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91d4f290-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/91dccbb0-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/9/91dccbb0-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cce54a552d7b75f63309b2c6a19f5da9b3818775
--- /dev/null
+++ b/graph/incidents_graphml/9/91dccbb0-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.222
+ 100.64.39.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91dccbb0-1411-11ee-918c-e193118b03e7
+
+
+ INCIDENT_LINK
+ 1687777619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91dccbb0-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/9/91e14a50-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/91e14a50-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..641abc6a908af6a97d1fb69168b0cbf5b6efe890
--- /dev/null
+++ b/graph/incidents_graphml/9/91e14a50-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.38
+ 100.64.13.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372749
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91e14a50-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372749
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91e14a50-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372749
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91e14a50-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/91e5bb70-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/91e5bb70-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18f1904b5a484ef539718e37bcd876e0cec39d71
--- /dev/null
+++ b/graph/incidents_graphml/9/91e5bb70-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.125
+ 100.64.27.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 91e5bb70-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/91e77310-0d0b-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/91e77310-0d0b-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17d777e3f3fb25c826b5936462e8d3f8d36dca62
--- /dev/null
+++ b/graph/incidents_graphml/9/91e77310-0d0b-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.66
+ 100.64.77.66
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687005384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91e77310-0d0b-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/91e7ea70-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/91e7ea70-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebd5d4190f49f25a7673474e2199e75a75f5e4e6
--- /dev/null
+++ b/graph/incidents_graphml/9/91e7ea70-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.74
+ 100.64.82.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354003
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91e7ea70-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/91ef2640-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91ef2640-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c2468f9b43f21449a4c1aeb2de608e03ba751f6
--- /dev/null
+++ b/graph/incidents_graphml/9/91ef2640-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91ef2640-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91f42f50-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91f42f50-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96f6d5ecf2c59ded5f15c621340e556d859f2d06
--- /dev/null
+++ b/graph/incidents_graphml/9/91f42f50-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91f42f50-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91f6ee70-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91f6ee70-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2e2ea0e37364ee604f652ae69b18dd890e1a204
--- /dev/null
+++ b/graph/incidents_graphml/9/91f6ee70-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.164
+ 100.64.92.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 91f6ee70-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91f71c40-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/91f71c40-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..460c089b83db6a9d4406e7db8bd6e5834bc660d8
--- /dev/null
+++ b/graph/incidents_graphml/9/91f71c40-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.70
+ 100.64.51.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.157
+ HOST-13552
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch","Windows Active Directory"]
+
+
+ HOST
+ 100.64.74.70
+ 100.64.74.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91f71c40-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91f71c40-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91f71c40-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 91f71c40-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/9/91f8a2e0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/91f8a2e0-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02036998e30979d641188939d5326968b4f70fc9
--- /dev/null
+++ b/graph/incidents_graphml/9/91f8a2e0-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.38
+ 100.64.13.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372749
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91f8a2e0-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/91fae610-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91fae610-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33158a7af523357a0251b623d542f60eeabe36bc
--- /dev/null
+++ b/graph/incidents_graphml/9/91fae610-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.164
+ 100.64.92.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91fae610-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91fd3000-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/91fd3000-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b871cb44398dbc7d7c19aefd6a288199619653db
--- /dev/null
+++ b/graph/incidents_graphml/9/91fd3000-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.168
+ 100.64.92.168
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91fd3000-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/91fe8060-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/91fe8060-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbdf840e87dcec7e1a134cb2cf145a94d411241a
--- /dev/null
+++ b/graph/incidents_graphml/9/91fe8060-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.224.180.206
+ 10.224.180.206
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91fe8060-ddf7-11ee-8fda-85a4db559b7b
+
+
+ INCIDENT_LINK
+ 1709976587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 91fe8060-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/920175c0-3238-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/9/920175c0-3238-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3f01265e2327874fdee5cf64dc6c8c6ebaa9bd9
--- /dev/null
+++ b/graph/incidents_graphml/9/920175c0-3238-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.84.184
+ 100.64.84.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662945406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 920175c0-3238-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/9/92035c20-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/92035c20-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c4530dc4fa63af4abbb65b8dc066ea773ffb360
--- /dev/null
+++ b/graph/incidents_graphml/9/92035c20-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.123
+ 100.64.9.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92035c20-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/920b2180-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/920b2180-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efc51d472184cc26ae19785cf764aaf3e8b5d450
--- /dev/null
+++ b/graph/incidents_graphml/9/920b2180-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.226
+ 100.64.34.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 920b2180-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/92116b70-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/92116b70-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d3504a053669ed5200ca091422effb9885c8047
--- /dev/null
+++ b/graph/incidents_graphml/9/92116b70-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.74
+ 100.64.82.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688354004
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92116b70-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/9212ba90-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/9212ba90-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb5a4d982113566baceb37c7a05198e3e6d830dc
--- /dev/null
+++ b/graph/incidents_graphml/9/9212ba90-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.247
+ 100.64.19.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9212ba90-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797639
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9212ba90-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/9/92133aa0-477a-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/92133aa0-477a-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b142402a1d263f8b39ea775ff8733864d4d8ebc3
--- /dev/null
+++ b/graph/incidents_graphml/9/92133aa0-477a-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.123
+ 100.64.9.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693430225
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92133aa0-477a-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/921340e0-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/921340e0-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdb970ddebd7f9cb04a23848d1da1a8604311f19
--- /dev/null
+++ b/graph/incidents_graphml/9/921340e0-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.62
+ 100.64.26.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 921340e0-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9215dc20-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/9215dc20-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..537cd4e6246f526e6b2974ddaa8c60374567414e
--- /dev/null
+++ b/graph/incidents_graphml/9/9215dc20-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.226
+ 100.64.9.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972451
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9215dc20-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/9217fc00-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/9217fc00-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8557f60f826253f77131e448471e9fb4e0cde70
--- /dev/null
+++ b/graph/incidents_graphml/9/9217fc00-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.159
+ 100.64.53.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081044
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9217fc00-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/921cd4c0-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/921cd4c0-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5baf7ba5127092361f095d00aec113ceb20d777b
--- /dev/null
+++ b/graph/incidents_graphml/9/921cd4c0-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.226
+ 100.64.34.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 921cd4c0-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/92236d80-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/92236d80-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fe5673285e943cd7d6987a581a1426fdbd3b66e
--- /dev/null
+++ b/graph/incidents_graphml/9/92236d80-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.62
+ 100.64.26.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92236d80-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9225b7a0-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/9225b7a0-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..422aa0a4f3d710760e505bbb82d7ff4e7af775f3
--- /dev/null
+++ b/graph/incidents_graphml/9/9225b7a0-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.159
+ 100.64.53.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081045
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9225b7a0-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/922b7ac0-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/922b7ac0-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5596a9cd2ec1d5b8555a2aec911c4314ac693ed
--- /dev/null
+++ b/graph/incidents_graphml/9/922b7ac0-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.100
+ 100.64.54.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460290
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 922b7ac0-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/922f95b0-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/922f95b0-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..598953e29e4b362852a9f89da29f363d3652e595
--- /dev/null
+++ b/graph/incidents_graphml/9/922f95b0-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.125
+ 100.64.27.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 922f95b0-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/92354210-eeb1-11ee-b8e8-b3aaf51abf44.graphml b/graph/incidents_graphml/9/92354210-eeb1-11ee-b8e8-b3aaf51abf44.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a54ed123386619b8056eb12673d98c5f2e85c2d8
--- /dev/null
+++ b/graph/incidents_graphml/9/92354210-eeb1-11ee-b8e8-b3aaf51abf44.graphml
@@ -0,0 +1,503 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.21
+ 100.64.31.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.6.187
+ 100.64.6.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.127
+ 100.64.37.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.128
+ 100.64.37.128
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.129
+ 100.64.37.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.130
+ 100.64.37.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.131
+ 100.64.37.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.201
+ 100.64.12.201
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92354210-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+
diff --git a/graph/incidents_graphml/9/92371cc0-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/92371cc0-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c572c8bbc32015103aecc5b6f01f2eca736024d
--- /dev/null
+++ b/graph/incidents_graphml/9/92371cc0-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.249
+ 100.64.24.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081045
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 92371cc0-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/923cb8d0-47c0-11ee-b8d0-61ae4b170fe6.graphml b/graph/incidents_graphml/9/923cb8d0-47c0-11ee-b8d0-61ae4b170fe6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea2aed85321f897c89e7c721bde32770d775d852
--- /dev/null
+++ b/graph/incidents_graphml/9/923cb8d0-47c0-11ee-b8d0-61ae4b170fe6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.100
+ 100.64.54.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693460290
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 923cb8d0-47c0-11ee-b8d0-61ae4b170fe6
+
+
+
diff --git a/graph/incidents_graphml/9/923fe960-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/923fe960-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a7514d0c381e3d04c439b207016aceb58f10d52
--- /dev/null
+++ b/graph/incidents_graphml/9/923fe960-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.125
+ 100.64.27.125
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 923fe960-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/924b1400-eeb1-11ee-b8e8-b3aaf51abf44.graphml b/graph/incidents_graphml/9/924b1400-eeb1-11ee-b8e8-b3aaf51abf44.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c944a2a49a11c5da6449739087da0bd794a8de4
--- /dev/null
+++ b/graph/incidents_graphml/9/924b1400-eeb1-11ee-b8e8-b3aaf51abf44.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.139
+ 100.64.37.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.254
+ 100.64.8.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.199
+ 100.64.31.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.140
+ 100.64.37.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.33
+ 100.64.10.33
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.141
+ 100.64.37.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.142
+ 100.64.37.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.250
+ 100.64.34.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.220
+ 100.64.14.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.127
+ USER-0015-1264.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.37.143
+ 100.64.37.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.144
+ 100.64.37.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.189
+ 100.64.23.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.145
+ 100.64.37.145
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.222
+ USER-0015-1311.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.43
+ 100.64.7.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.146
+ 100.64.37.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.147
+ USER-0015-1312.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+ INCIDENT_LINK
+ 1711815692
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 924b1400-eeb1-11ee-b8e8-b3aaf51abf44
+
+
+
diff --git a/graph/incidents_graphml/9/9255d330-1b82-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/9/9255d330-1b82-11ed-9931-5799b48b5de2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f066fc93b0e6401790103949938d60b6cfe09204
--- /dev/null
+++ b/graph/incidents_graphml/9/9255d330-1b82-11ed-9931-5799b48b5de2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.188
+ 100.64.1.188
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.172
+ 100.64.79.172
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.149
+ 100.64.77.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660448313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9255d330-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9255d330-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9255d330-1b82-11ed-9931-5799b48b5de2
+
+
+ INCIDENT_LINK
+ 1660448313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9255d330-1b82-11ed-9931-5799b48b5de2
+
+
+
diff --git a/graph/incidents_graphml/9/9256a4e0-2a31-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/9/9256a4e0-2a31-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf58d08bb8c5992bfee7189fb33c340ac7ad601d
--- /dev/null
+++ b/graph/incidents_graphml/9/9256a4e0-2a31-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.164
+ 100.64.68.164
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690210289
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9256a4e0-2a31-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210289
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9256a4e0-2a31-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/9/9260cc40-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/9260cc40-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4976d550321e52db98bdfc78a308859ec8478ba
--- /dev/null
+++ b/graph/incidents_graphml/9/9260cc40-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9260cc40-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/9278e4b0-8d5f-11ee-9951-411438339097.graphml b/graph/incidents_graphml/9/9278e4b0-8d5f-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c28452c08f96d4599b4bc88110add001d82d17a9
--- /dev/null
+++ b/graph/incidents_graphml/9/9278e4b0-8d5f-11ee-9951-411438339097.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.13
+ 100.64.68.13
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.15
+ 100.64.68.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701115211
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9278e4b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115211
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9278e4b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115211
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9278e4b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115211
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9278e4b0-8d5f-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/9/927c6300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/9/927c6300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6e814081f0dbc401269243ee2c64f98e5ea737e
--- /dev/null
+++ b/graph/incidents_graphml/9/927c6300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.200
+ 100.64.73.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.11
+ 100.64.80.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 927c6300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 927c6300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 927c6300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 927c6300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/9/927ed420-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/927ed420-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2f7d1d4f19e8d61ce843fa6c41153b72f7a7d3c
--- /dev/null
+++ b/graph/incidents_graphml/9/927ed420-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.161
+ 100.64.53.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081045
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 927ed420-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/92887880-fa48-11ed-92e9-edc32a467d1f.graphml b/graph/incidents_graphml/9/92887880-fa48-11ed-92e9-edc32a467d1f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfd8e7f02a8ce6bb9f76a17350d1ac6433ccd45c
--- /dev/null
+++ b/graph/incidents_graphml/9/92887880-fa48-11ed-92e9-edc32a467d1f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684942512
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92887880-fa48-11ed-92e9-edc32a467d1f
+
+
+
diff --git a/graph/incidents_graphml/9/928f00c0-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/928f00c0-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26d5c0e01427d337e909b785bcd392777205c024
--- /dev/null
+++ b/graph/incidents_graphml/9/928f00c0-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081045
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 928f00c0-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/9291bf00-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/9291bf00-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8b8c8a2c0f2b08c318aa38defde5d7554957e60
--- /dev/null
+++ b/graph/incidents_graphml/9/9291bf00-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.78
+ 100.64.82.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354004
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9291bf00-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/92931f50-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/9/92931f50-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09146664353b0afffb98cc86db165d58ccf4c1ca
--- /dev/null
+++ b/graph/incidents_graphml/9/92931f50-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.13
+ 100.64.36.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.235
+ 100.64.71.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92931f50-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92931f50-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/9/9293f8b0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/9293f8b0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52ee916ab1da0773c81331a81608be48670bd5c1
--- /dev/null
+++ b/graph/incidents_graphml/9/9293f8b0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.243
+ 100.64.28.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9293f8b0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/929f63e0-fed2-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/9/929f63e0-fed2-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a4210e48b235b7f00080ce28140a229e6a523ad
--- /dev/null
+++ b/graph/incidents_graphml/9/929f63e0-fed2-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.97
+ 100.64.26.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685441587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 929f63e0-fed2-11ed-b0fc-1f31d51c8878
+
+
+ INCIDENT_LINK
+ 1685441587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 929f63e0-fed2-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/9/92a37300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/9/92a37300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c20bca47699ae1a6c6b729aeeb8a6e9c7bcb6c1
--- /dev/null
+++ b/graph/incidents_graphml/9/92a37300-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.94
+ 100.64.50.94
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.176
+ 100.64.72.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92a37300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92a37300-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/9/92af75d0-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/92af75d0-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7895965b77b58eb78fb269cbacb9ce330014c588
--- /dev/null
+++ b/graph/incidents_graphml/9/92af75d0-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811917
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92af75d0-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/92b880e0-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/92b880e0-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aaaf6965b1b49ad821e450b458b8d47cac2fca5a
--- /dev/null
+++ b/graph/incidents_graphml/9/92b880e0-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.78
+ 100.64.82.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92b880e0-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/92b95470-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/9/92b95470-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b909c9d824769e96d78caf462cde0db833fb97c
--- /dev/null
+++ b/graph/incidents_graphml/9/92b95470-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672372431
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92b95470-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/9/92bacaa0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/92bacaa0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..296820fc6006cbc776e1bc74d7a3039105eec050
--- /dev/null
+++ b/graph/incidents_graphml/9/92bacaa0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.219
+ 100.64.22.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122741
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92bacaa0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/92bc13a0-fed2-11ed-b0fc-1f31d51c8878.graphml b/graph/incidents_graphml/9/92bc13a0-fed2-11ed-b0fc-1f31d51c8878.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03a7f936feb7d05b445843574b05857797aa9717
--- /dev/null
+++ b/graph/incidents_graphml/9/92bc13a0-fed2-11ed-b0fc-1f31d51c8878.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.97
+ 100.64.26.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685441587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92bc13a0-fed2-11ed-b0fc-1f31d51c8878
+
+
+
diff --git a/graph/incidents_graphml/9/92bccaf0-0be4-11ef-b512-05786bea65d3.graphml b/graph/incidents_graphml/9/92bccaf0-0be4-11ef-b512-05786bea65d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f30d34ef55e8bc6da9d546db8003c0085b319d10
--- /dev/null
+++ b/graph/incidents_graphml/9/92bccaf0-0be4-11ef-b512-05786bea65d3.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.106.136
+ 172.21.106.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Apache Web Server"]
+
+
+ HOST
+ 100.64.87.86
+ 100.64.87.86
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.207.185
+ 172.26.207.185
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.75.65
+ 172.26.75.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.87
+ 100.64.87.87
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.88
+ 100.64.87.88
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.89
+ 100.64.87.89
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.90
+ 100.64.87.90
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+ INCIDENT_LINK
+ 1715026181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92bccaf0-0be4-11ef-b512-05786bea65d3
+
+
+
diff --git a/graph/incidents_graphml/9/92c53090-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/92c53090-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e11ef65cb041c244f4c0645d71864df227fbc730
--- /dev/null
+++ b/graph/incidents_graphml/9/92c53090-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857479
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92c53090-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/92c547c0-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/92c547c0-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d95335005b8c3162153b408ec809df2bffbb17b2
--- /dev/null
+++ b/graph/incidents_graphml/9/92c547c0-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811917
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92c547c0-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/92c625b0-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/9/92c625b0-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e16c938140b3299ba0b5ec9c0e920d1b37b19bf9
--- /dev/null
+++ b/graph/incidents_graphml/9/92c625b0-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672372431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92c625b0-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/9/92c970a0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/92c970a0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c138872d9aec2a311648e0213374c3236c0136c8
--- /dev/null
+++ b/graph/incidents_graphml/9/92c970a0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.221
+ 100.64.22.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122742
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92c970a0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/92ce7d90-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/9/92ce7d90-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a9a50d32df3ad1cdde9e8c7625c4bfcf8a5e54e
--- /dev/null
+++ b/graph/incidents_graphml/9/92ce7d90-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.166
+ USER-0015-1615.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.216
+ 100.64.81.216
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656543759
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92ce7d90-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543759
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92ce7d90-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+
diff --git a/graph/incidents_graphml/9/92d021e0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/92d021e0-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bee22c949129e6d7d13806d916748254a86c139a
--- /dev/null
+++ b/graph/incidents_graphml/9/92d021e0-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.155
+ 100.64.72.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.226
+ 100.64.12.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.35.122
+ 100.64.35.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.5.124
+ 100.64.5.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92d021e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/9/92d17cc0-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/92d17cc0-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a428b9a55722d41d2c059aac861e9daaee45b3d
--- /dev/null
+++ b/graph/incidents_graphml/9/92d17cc0-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.74
+ 100.64.18.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92d17cc0-540b-11ee-81a7-334be12fd476
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92d17cc0-540b-11ee-81a7-334be12fd476
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92d17cc0-540b-11ee-81a7-334be12fd476
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92d17cc0-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/92d864f0-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/92d864f0-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dabd46341226902bc117bbc46787ca6fa16f9d0
--- /dev/null
+++ b/graph/incidents_graphml/9/92d864f0-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.14
+ 100.64.76.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92d864f0-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/92daaeb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/92daaeb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c850017e3d185fa0f074a9548336016835ee1cef
--- /dev/null
+++ b/graph/incidents_graphml/9/92daaeb0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.221
+ 100.64.22.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122742
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92daaeb0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/92defa20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/92defa20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cc20641bf14ef6ddc493dac038c7fe2a0ba3a0d
--- /dev/null
+++ b/graph/incidents_graphml/9/92defa20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857479
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92defa20-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/92e1d520-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/92e1d520-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ce751661b5cef27fdc110e48b1462bc6e3d276e
--- /dev/null
+++ b/graph/incidents_graphml/9/92e1d520-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92e1d520-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92e1d520-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/9/92ea6cc0-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/9/92ea6cc0-0a46-11ef-8e53-fb0f959aa93f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b73ff430624b2e9bc1d90f669f7d2aea717c5cce
--- /dev/null
+++ b/graph/incidents_graphml/9/92ea6cc0-0a46-11ef-8e53-fb0f959aa93f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.65
+ 100.64.33.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714848370
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92ea6cc0-0a46-11ef-8e53-fb0f959aa93f
+
+
+
diff --git a/graph/incidents_graphml/9/92ebb5a0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/92ebb5a0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8970b281fe144e03154959880f7c62f002b19f4
--- /dev/null
+++ b/graph/incidents_graphml/9/92ebb5a0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.162
+ 100.64.9.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92ebb5a0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/92ec3ae0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/92ec3ae0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abcb4fc560954141213bde2612e31ac56beba589
--- /dev/null
+++ b/graph/incidents_graphml/9/92ec3ae0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.223
+ 100.64.22.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122742
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 92ec3ae0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/92f33a40-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/92f33a40-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be95c12d62bc68133e56e8727ed463b019da3ebb
--- /dev/null
+++ b/graph/incidents_graphml/9/92f33a40-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.190
+ 100.64.40.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.156
+ 100.64.72.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92f33a40-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92f33a40-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/9/92f38e10-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/92f38e10-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24057511c49715f3b7b622bf3de56c381f465e09
--- /dev/null
+++ b/graph/incidents_graphml/9/92f38e10-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.14
+ 100.64.76.14
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688354005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92f38e10-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/92f41ff0-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/92f41ff0-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b11c3375e79c34a679b3e79e77e684befb33e0f
--- /dev/null
+++ b/graph/incidents_graphml/9/92f41ff0-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.74
+ 100.64.18.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 92f41ff0-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/92f7a4b0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/9/92f7a4b0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8c55a1105dfb96d111290dfc32101aa2911a82e
--- /dev/null
+++ b/graph/incidents_graphml/9/92f7a4b0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.250
+ 100.64.39.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139658
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92f7a4b0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/9/92fa5ad0-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/92fa5ad0-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ede3c83cd7aa4bd294d1b375a02c6de1945bb93d
--- /dev/null
+++ b/graph/incidents_graphml/9/92fa5ad0-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.42
+ 100.64.72.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.205
+ 100.64.73.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.133
+ 100.64.72.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 92fa5ad0-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/92faeb80-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/9/92faeb80-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15d5be2cca70074e75c12de7dbbdf77915ec0ae8
--- /dev/null
+++ b/graph/incidents_graphml/9/92faeb80-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.255
+ 100.64.71.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687449055
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92faeb80-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449055
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92faeb80-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/9/92ff74c0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/92ff74c0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b61d7411ff8544f1f704126482b3e574a21f905
--- /dev/null
+++ b/graph/incidents_graphml/9/92ff74c0-5ff7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.223
+ 100.64.22.223
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696122742
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 92ff74c0-5ff7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/9300d560-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/9300d560-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c6985aeda8c3f6866bf90b27661291c314feb6c
--- /dev/null
+++ b/graph/incidents_graphml/9/9300d560-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.159
+ 100.64.7.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081046
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9300d560-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/93084430-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/93084430-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..408ec62469a4c32a8f999b7ed8d6e9388e15eb17
--- /dev/null
+++ b/graph/incidents_graphml/9/93084430-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.73
+ 100.64.60.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 93084430-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/9309aed0-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/9309aed0-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc8580b0b265e3f6b034cfc2fc33a60b2428f67e
--- /dev/null
+++ b/graph/incidents_graphml/9/9309aed0-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.123
+ 100.64.32.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976588
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9309aed0-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/930afca0-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/930afca0-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46ed63ec29510d54fcd00b2beb28f0634f6d8369
--- /dev/null
+++ b/graph/incidents_graphml/9/930afca0-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.206
+ 100.64.73.206
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.207
+ 100.64.73.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 930afca0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 930afca0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 930afca0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064344
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 930afca0-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/930b82e0-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/930b82e0-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6e5033256fa9250105140a400baa9e9309fab79
--- /dev/null
+++ b/graph/incidents_graphml/9/930b82e0-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.80
+ 100.64.82.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 930b82e0-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/930f5de0-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/9/930f5de0-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4839d097613812326457dbd49bab7d17ce74bfe7
--- /dev/null
+++ b/graph/incidents_graphml/9/930f5de0-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.131
+ 100.64.32.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687449056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 930f5de0-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 930f5de0-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/9/93181cd0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/93181cd0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f61f353b90bea06ca72513f04ac08d9f6569928a
--- /dev/null
+++ b/graph/incidents_graphml/9/93181cd0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.131
+ 100.64.45.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055436
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93181cd0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/93206b20-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/93206b20-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85f3b5b542a42b7909784f39e039344d20759ca1
--- /dev/null
+++ b/graph/incidents_graphml/9/93206b20-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.123
+ 100.64.32.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 93206b20-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/932e26f0-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/932e26f0-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b978d5c4bec36de593a6042fd61691e8112a195
--- /dev/null
+++ b/graph/incidents_graphml/9/932e26f0-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 932e26f0-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/932ffad0-194f-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/9/932ffad0-194f-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcfb7eca85c3e9104c207e2ce8e4d170a43dce7a
--- /dev/null
+++ b/graph/incidents_graphml/9/932ffad0-194f-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.80
+ 100.64.82.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688354006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 932ffad0-194f-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/9/93302470-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/93302470-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad295f3b7a49df137b3cfad7c5d64ec78f244d25
--- /dev/null
+++ b/graph/incidents_graphml/9/93302470-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.113
+ 100.64.87.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1671749232
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 93302470-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9330e5e0-ddf7-11ee-8fda-85a4db559b7b.graphml b/graph/incidents_graphml/9/9330e5e0-ddf7-11ee-8fda-85a4db559b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d1ba840d54f50fb23629d7f87f6b1db6a2aec70
--- /dev/null
+++ b/graph/incidents_graphml/9/9330e5e0-ddf7-11ee-8fda-85a4db559b7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.42
+ 100.64.15.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709976589
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9330e5e0-ddf7-11ee-8fda-85a4db559b7b
+
+
+
diff --git a/graph/incidents_graphml/9/934631b0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/934631b0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f76ace1781d016accda36672aab3e12ba8ecb92f
--- /dev/null
+++ b/graph/incidents_graphml/9/934631b0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.94
+ 100.64.49.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055436
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 934631b0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/935bbb60-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/935bbb60-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13aa98755a8f328b7e8095fa7b8d23bea36eaad3
--- /dev/null
+++ b/graph/incidents_graphml/9/935bbb60-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.75
+ 100.64.60.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 935bbb60-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/9361dfc0-48f0-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/9361dfc0-48f0-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be2bae5f3b18bb04c11c9abb6d51e99b347a9b48
--- /dev/null
+++ b/graph/incidents_graphml/9/9361dfc0-48f0-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.20
+ 100.64.19.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.115
+ 100.64.33.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.95
+ 100.64.38.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.96
+ USER-0015-1316.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.97
+ 100.64.38.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.192
+ 100.64.9.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.98
+ 100.64.38.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.99
+ 100.64.38.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9361dfc0-48f0-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/936356a0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/936356a0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f051a12bad0dc5609b8bb8805a88f8bcda556e7
--- /dev/null
+++ b/graph/incidents_graphml/9/936356a0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.94
+ 100.64.49.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055436
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 936356a0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/9365e700-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/9365e700-5161-11ed-8537-055dd7dfd795.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fc965100e0de3c46125cb138b70a47ea7678570
--- /dev/null
+++ b/graph/incidents_graphml/9/9365e700-5161-11ed-8537-055dd7dfd795.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.126
+ 100.64.72.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.127
+ 100.64.72.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666371504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9365e700-5161-11ed-8537-055dd7dfd795
+
+
+ INCIDENT_LINK
+ 1666371504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9365e700-5161-11ed-8537-055dd7dfd795
+
+
+
diff --git a/graph/incidents_graphml/9/936c0860-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/936c0860-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cff40a89f8e9503e10e305395f50d064dc3f6bbe
--- /dev/null
+++ b/graph/incidents_graphml/9/936c0860-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.7
+ 100.64.22.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 936c0860-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 936c0860-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/936c5d30-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/936c5d30-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b16d046c5bdaa6cda4493bc906cbf07d8dcf7cd
--- /dev/null
+++ b/graph/incidents_graphml/9/936c5d30-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.75
+ 100.64.60.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 936c5d30-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/93734af0-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/9/93734af0-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4c05ab274d8cf48fa499c14cf9f8125dbe7ae5c
--- /dev/null
+++ b/graph/incidents_graphml/9/93734af0-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.138
+ 100.64.54.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.31.14
+ 100.64.31.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93734af0-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93734af0-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93734af0-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93734af0-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/9/93736d50-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/93736d50-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd6eb25701f6804bc8777d6a57881a0c2d76bd3e
--- /dev/null
+++ b/graph/incidents_graphml/9/93736d50-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.147
+ 100.64.23.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081047
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93736d50-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/937530f0-e006-11ed-88f8-c9d544f9b492.graphml b/graph/incidents_graphml/9/937530f0-e006-11ed-88f8-c9d544f9b492.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb821aa822fb1aa372975c82f1c984d75fd74d53
--- /dev/null
+++ b/graph/incidents_graphml/9/937530f0-e006-11ed-88f8-c9d544f9b492.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.120
+ 100.64.3.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1682055436
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 937530f0-e006-11ed-88f8-c9d544f9b492
+
+
+
diff --git a/graph/incidents_graphml/9/937dab20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/937dab20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4492419f76c9c694ec573b39d15b57e6f5175c1b
--- /dev/null
+++ b/graph/incidents_graphml/9/937dab20-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.121
+ 100.64.47.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 937dab20-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/937de960-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/937de960-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88a1443a9a4ec816ffcdb21883cb48515df95bcd
--- /dev/null
+++ b/graph/incidents_graphml/9/937de960-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.77
+ 100.64.60.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 937de960-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/9382d6a0-444d-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/9/9382d6a0-444d-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d533f048d2fb40159504182e16ce971d0682858f
--- /dev/null
+++ b/graph/incidents_graphml/9/9382d6a0-444d-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.147
+ 100.64.23.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693081047
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9382d6a0-444d-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/9/93896950-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/93896950-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f58405ee7d3d459be473bf600118b814cd69ac6f
--- /dev/null
+++ b/graph/incidents_graphml/9/93896950-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.228
+ 100.64.9.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 93896950-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/938dd7c0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml b/graph/incidents_graphml/9/938dd7c0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..343e6807e50ee7b91c915a9a07e8abb199b2f79a
--- /dev/null
+++ b/graph/incidents_graphml/9/938dd7c0-6fbe-11ee-ad1d-0d1e6f8fec28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.121
+ 100.64.47.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697857480
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 938dd7c0-6fbe-11ee-ad1d-0d1e6f8fec28
+
+
+
diff --git a/graph/incidents_graphml/9/9393e260-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/9393e260-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a11a9f929c16295481fd9c786211d9e094e2244a
--- /dev/null
+++ b/graph/incidents_graphml/9/9393e260-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.77
+ 100.64.60.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9393e260-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/93969670-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/93969670-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b39391393c75d1bd360e09d1c71fdbea7ffd72b6
--- /dev/null
+++ b/graph/incidents_graphml/9/93969670-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.42
+ 100.64.30.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517326
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 93969670-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/939aa760-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/939aa760-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25ffd0c93d18f278f7f9b0e46b8e85b04e3f0c8c
--- /dev/null
+++ b/graph/incidents_graphml/9/939aa760-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.230
+ 100.64.9.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 939aa760-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/93a71c40-540b-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/9/93a71c40-540b-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f38148d3d38cae46066ba5f2900e165ead5474c
--- /dev/null
+++ b/graph/incidents_graphml/9/93a71c40-540b-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.79
+ 100.64.60.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93a71c40-540b-11ee-81a7-334be12fd476
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93a71c40-540b-11ee-81a7-334be12fd476
+
+
+ INCIDENT_LINK
+ 1694811919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93a71c40-540b-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/9/93b5e380-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/93b5e380-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8a5dfe37479d55d18c755b593e832a1419a57fb
--- /dev/null
+++ b/graph/incidents_graphml/9/93b5e380-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.210.77.251
+ 10.210.77.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.94
+ 100.64.72.94
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098061
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93b5e380-3244-11ee-b975-db6b43f597fd
+
+
+ INCIDENT_LINK
+ 1691098061
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93b5e380-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/93b8b180-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/93b8b180-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..371f6645926f2aa222cca386f9b9a7d5c4c1f898
--- /dev/null
+++ b/graph/incidents_graphml/9/93b8b180-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660593915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93b8b180-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/93ca0140-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/93ca0140-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa8a5667b19eda583d96ab28e5e75458c0685726
--- /dev/null
+++ b/graph/incidents_graphml/9/93ca0140-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.19
+ 100.64.15.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93ca0140-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/93ccedf0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/93ccedf0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c55a91762d5eeffab7718df35548fba255340613
--- /dev/null
+++ b/graph/incidents_graphml/9/93ccedf0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.168
+ 100.64.74.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691098061
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93ccedf0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/93d30790-a5f7-11ee-bc9b-590f3fe4ac14.graphml b/graph/incidents_graphml/9/93d30790-a5f7-11ee-bc9b-590f3fe4ac14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05eef565655a44bce9c84755a63983157ea8aa47
--- /dev/null
+++ b/graph/incidents_graphml/9/93d30790-a5f7-11ee-bc9b-590f3fe4ac14.graphml
@@ -0,0 +1,573 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.144
+ 100.64.70.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.145
+ 100.64.70.145
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.70.146
+ 100.64.70.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.70.147
+ 100.64.70.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.148
+ 100.64.70.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.149
+ 100.64.70.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.11.104
+ 100.64.11.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.18.54
+ USER-0015-1536.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.150
+ 100.64.70.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 93d30790-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+
diff --git a/graph/incidents_graphml/9/93d3cae0-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/93d3cae0-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d317486b7999bf2d573ca7ca32c62847cb1535ac
--- /dev/null
+++ b/graph/incidents_graphml/9/93d3cae0-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.169
+ 100.64.54.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.208
+ 100.64.73.208
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93d3cae0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93d3cae0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93d3cae0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93d3cae0-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/93d7e530-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/93d7e530-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1ac9482ace7a139f931a02aba76fd3d643701ec
--- /dev/null
+++ b/graph/incidents_graphml/9/93d7e530-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.136
+ 100.64.14.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93d7e530-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/93e16050-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/93e16050-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbc78a65a3d716f82c5e342cebdf6f2064705f3c
--- /dev/null
+++ b/graph/incidents_graphml/9/93e16050-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.168
+ 100.64.74.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098061
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 93e16050-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/93ecf3d0-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/93ecf3d0-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4d0701244a1458f2d8bf2eef1796f3067c55d64
--- /dev/null
+++ b/graph/incidents_graphml/9/93ecf3d0-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.136
+ 100.64.14.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517326
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 93ecf3d0-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/93f38240-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/93f38240-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4759a784cc541c6aeeb81124740aa58874ad389
--- /dev/null
+++ b/graph/incidents_graphml/9/93f38240-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.19
+ 100.64.15.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 93f38240-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/93f42500-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/93f42500-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e351d1ca8ad764e2ef2edc79f9acfdddcb297acd
--- /dev/null
+++ b/graph/incidents_graphml/9/93f42500-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.210.77.251
+ 10.210.77.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.2
+ 100.64.82.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098061
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 93f42500-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/93fd6e90-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/93fd6e90-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48393188ba1cb5eaa0e0d59f22e1dca60dd5ee13
--- /dev/null
+++ b/graph/incidents_graphml/9/93fd6e90-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.44
+ 100.64.30.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 93fd6e90-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/9404ea40-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9404ea40-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2113aba462914e12921321ad2bb81dd4e0ac667a
--- /dev/null
+++ b/graph/incidents_graphml/9/9404ea40-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.106
+ 100.64.73.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.160
+ USER-0015-1654.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.29.210
+ 100.64.29.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9404ea40-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9404ea40-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9404ea40-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9404ea40-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/940527c0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/940527c0-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a2967d4d8906944df7d7bfac0b950a638c42180
--- /dev/null
+++ b/graph/incidents_graphml/9/940527c0-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.52
+ 100.64.32.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661196069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 940527c0-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/9409cc40-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9409cc40-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..227546832af1396dfab345a165afcc8f6a481470
--- /dev/null
+++ b/graph/incidents_graphml/9/9409cc40-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.187
+ 100.64.80.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9409cc40-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9409cc40-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/940b01e0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/940b01e0-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10a8428153eff91a21ac4477b10edd4f9518211a
--- /dev/null
+++ b/graph/incidents_graphml/9/940b01e0-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.21
+ 100.64.15.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262988
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 940b01e0-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/940bb770-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/940bb770-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22d02956ee9a9c29c80c4394609edc008e64d693
--- /dev/null
+++ b/graph/incidents_graphml/9/940bb770-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.32.52
+ 100.64.32.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661196069
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 940bb770-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/940e3910-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/940e3910-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d829fab37ddd0f0a87ce4bc876942a3761657384
--- /dev/null
+++ b/graph/incidents_graphml/9/940e3910-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.188
+ 100.64.80.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.141
+ USER-0015-1834.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 940e3910-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 940e3910-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/94134220-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/94134220-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a5afeed4f7a1e75353bf6d9f169e9f0cedca0dc
--- /dev/null
+++ b/graph/incidents_graphml/9/94134220-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.192
+ 100.64.9.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94134220-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94134220-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/9414a010-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/9414a010-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ff16739d0a0ccce9a3c2eea3575c34e195e0b5d
--- /dev/null
+++ b/graph/incidents_graphml/9/9414a010-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.44
+ 100.64.30.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517327
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9414a010-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/9418c3f0-5c89-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/9/9418c3f0-5c89-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f625ce94ff9d5b3186069302b415cb2c8277b82f
--- /dev/null
+++ b/graph/incidents_graphml/9/9418c3f0-5c89-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.88
+ 100.64.69.88
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.234
+ 100.64.11.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.89
+ 100.64.69.89
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.90
+ 100.64.69.90
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745646
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9418c3f0-5c89-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/9/941ea130-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/941ea130-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..443f02e89ed683ca2ef7b3bf4b0fad0afadc6a8f
--- /dev/null
+++ b/graph/incidents_graphml/9/941ea130-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.174.182
+ 192.168.174.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.79
+ 100.64.74.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 941ea130-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 941ea130-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/94272eb0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/94272eb0-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6907f4e066bbfbbb9b323211b3534b57902a537
--- /dev/null
+++ b/graph/incidents_graphml/9/94272eb0-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.78
+ 100.64.85.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661196070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94272eb0-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/94275f70-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/94275f70-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..715851e18612e25c2fefee588ea5563d2e01c46f
--- /dev/null
+++ b/graph/incidents_graphml/9/94275f70-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.181
+ USER-0015-1273.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94275f70-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/942d5870-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/942d5870-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1424578055023bf9881bc8b694bfc5a0e5bcebd8
--- /dev/null
+++ b/graph/incidents_graphml/9/942d5870-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.100
+ 100.64.76.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714735
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 942d5870-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/942f6c10-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/942f6c10-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6e32217252c51205cbe544c6ba7415ad884b2d7
--- /dev/null
+++ b/graph/incidents_graphml/9/942f6c10-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.78
+ 100.64.85.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661196070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 942f6c10-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/9433d6e0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/9433d6e0-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97180a909fec7147f16af535950b339f97b44c6e
--- /dev/null
+++ b/graph/incidents_graphml/9/9433d6e0-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.44.252
+ 192.168.44.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.113
+ 100.64.82.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9433d6e0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9433d6e0-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/9437a970-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/9437a970-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42d85bfaec685c571052af6c0f8e90e6bc1bb2e2
--- /dev/null
+++ b/graph/incidents_graphml/9/9437a970-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.78
+ 100.64.85.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661196070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9437a970-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/94383aa0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/9/94383aa0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2fe1ad4d4c38893baeaeab6f86d1d1ce27066bd
--- /dev/null
+++ b/graph/incidents_graphml/9/94383aa0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.36
+ USER-0015-2115.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 94383aa0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/9/9441e2a0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/9441e2a0-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8038516bac0740e6e0e83bce703933845c9ea7d
--- /dev/null
+++ b/graph/incidents_graphml/9/9441e2a0-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.78
+ 100.64.85.78
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661196070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9441e2a0-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/94438dd0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/94438dd0-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f9afb912b878e69912a5ca6b5224dcf5cdea819
--- /dev/null
+++ b/graph/incidents_graphml/9/94438dd0-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.207
+ 100.64.18.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94438dd0-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/9/944b8940-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/944b8940-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd075e396b4d8cff090e0529eca6aad49e19d50a
--- /dev/null
+++ b/graph/incidents_graphml/9/944b8940-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.181
+ USER-0015-1273.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 944b8940-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/944c8f00-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/944c8f00-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39cc137affdab16a8672a477e3c12de2706020db
--- /dev/null
+++ b/graph/incidents_graphml/9/944c8f00-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.205.4210
+ 192.168.238.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.114
+ 100.64.82.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 944c8f00-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 944c8f00-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/9457b0a0-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/9457b0a0-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bd32f58703082fff75769c7cde7f378153c20ee
--- /dev/null
+++ b/graph/incidents_graphml/9/9457b0a0-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.40
+ 100.64.1.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660593916
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9457b0a0-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/9468dd20-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/9/9468dd20-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..841d67129ab908b741b41685135e06c9fc2ee023
--- /dev/null
+++ b/graph/incidents_graphml/9/9468dd20-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.23
+ 100.64.69.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695254731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9468dd20-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/9/946b9850-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/9/946b9850-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bc18ae10053745dc9841c29ba10c9098960d3f3
--- /dev/null
+++ b/graph/incidents_graphml/9/946b9850-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.180
+ 100.64.87.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672372434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 946b9850-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/9/94770a00-87f5-11ed-9f01-ef8ef15959cb.graphml b/graph/incidents_graphml/9/94770a00-87f5-11ed-9f01-ef8ef15959cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1d514e6e2ef98b0491385f2b6dc5f2758b6fc7f
--- /dev/null
+++ b/graph/incidents_graphml/9/94770a00-87f5-11ed-9f01-ef8ef15959cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.180
+ 100.64.87.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1672372434
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 94770a00-87f5-11ed-9f01-ef8ef15959cb
+
+
+
diff --git a/graph/incidents_graphml/9/9477c2a0-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/9/9477c2a0-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4699bfc2bf6fcf5d2b1cafe04a5d5b7fac7b7045
--- /dev/null
+++ b/graph/incidents_graphml/9/9477c2a0-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962140
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9477c2a0-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962140
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9477c2a0-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/9/947981a0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/947981a0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bcf1927c9ffab8c96177ae5a64e0393d4ecdbe9
--- /dev/null
+++ b/graph/incidents_graphml/9/947981a0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.4
+ 100.64.82.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691098062
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 947981a0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14.graphml b/graph/incidents_graphml/9/947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44230f9105659e532ada0c459c723e6fb0f29e06
--- /dev/null
+++ b/graph/incidents_graphml/9/947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.132
+ 100.64.29.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.152
+ 100.64.70.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.78
+ 100.64.14.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.153
+ 100.64.70.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.54.27
+ 100.64.54.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.54.23
+ 100.64.54.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 947e3bb0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+
diff --git a/graph/incidents_graphml/9/9488f5e0-4888-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/9/9488f5e0-4888-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bc7fb82949f1ef4a54dabf0057e661e39148a14
--- /dev/null
+++ b/graph/incidents_graphml/9/9488f5e0-4888-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546194
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9488f5e0-4888-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/9/94896e00-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/94896e00-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41cc156000c7779bf63697b9d74b82f4455434e0
--- /dev/null
+++ b/graph/incidents_graphml/9/94896e00-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,539 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.30
+ 100.64.45.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.64
+ 100.64.25.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.31
+ 100.64.45.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.182
+ 100.64.16.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.32
+ 100.64.45.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.33
+ 100.64.45.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.34
+ 100.64.45.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.35
+ 100.64.45.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.36
+ USER-0015-1346.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.57
+ 100.64.28.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.155
+ 100.64.31.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.37
+ 100.64.45.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94896e00-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/948d79d0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/948d79d0-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2d61e9a487c0bd058aac1abde717c56540ffe2d
--- /dev/null
+++ b/graph/incidents_graphml/9/948d79d0-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.102
+ 100.64.76.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714736
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 948d79d0-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/94988930-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/94988930-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e8864f075a88c50fb6dc44b6c6b77612181fb5b
--- /dev/null
+++ b/graph/incidents_graphml/9/94988930-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.46
+ 100.64.45.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.47
+ 100.64.45.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.48
+ 100.64.45.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.49
+ 100.64.45.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.50
+ 100.64.45.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.51
+ 100.64.45.51
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.152
+ 100.64.43.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.52
+ 100.64.45.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.53
+ 100.64.45.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.54
+ 100.64.45.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.55
+ USER-0015-1347.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.56
+ 100.64.45.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.128
+ 100.64.25.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.57
+ 100.64.45.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94988930-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/9499b3d0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/9499b3d0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81e22acfe86796468592435edd1122afc9afbc6a
--- /dev/null
+++ b/graph/incidents_graphml/9/9499b3d0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.4
+ 100.64.82.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098062
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9499b3d0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/9/949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f115a70a6e3a8a68584d157b04496b230a67acd0
--- /dev/null
+++ b/graph/incidents_graphml/9/949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,179 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 949eebb0-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/9/949fa240-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/949fa240-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d980d2f33846209331c02973c44f6bcf95d105b
--- /dev/null
+++ b/graph/incidents_graphml/9/949fa240-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.102
+ 100.64.76.102
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714736
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 949fa240-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/94a253d0-0be4-11ef-b512-05786bea65d3.graphml b/graph/incidents_graphml/9/94a253d0-0be4-11ef-b512-05786bea65d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10616c5404d8b80cf1105dbd3c80b006fe078fae
--- /dev/null
+++ b/graph/incidents_graphml/9/94a253d0-0be4-11ef-b512-05786bea65d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.96
+ 100.64.87.96
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715026184
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94a253d0-0be4-11ef-b512-05786bea65d3
+
+
+
diff --git a/graph/incidents_graphml/9/94abacb0-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/94abacb0-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e2ed998609acb3e62e7e30149a6290bf1dc5aba
--- /dev/null
+++ b/graph/incidents_graphml/9/94abacb0-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.114
+ 100.64.8.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 94abacb0-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/94af1850-4af5-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/9/94af1850-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0abb922c4acbdfc888c0d4946b4a4ff34c5a1d68
--- /dev/null
+++ b/graph/incidents_graphml/9/94af1850-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693812911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 94af1850-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/9/94b8dcb0-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/9/94b8dcb0-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a26019444666395a919098cc405be15b5d389e5
--- /dev/null
+++ b/graph/incidents_graphml/9/94b8dcb0-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.252
+ 100.64.39.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139661
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94b8dcb0-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/9/94bd11d0-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/94bd11d0-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cafd6886e8a1be95e1ff2414d14c95be10b0a1d9
--- /dev/null
+++ b/graph/incidents_graphml/9/94bd11d0-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94bd11d0-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/94c14d80-0be4-11ef-b512-05786bea65d3.graphml b/graph/incidents_graphml/9/94c14d80-0be4-11ef-b512-05786bea65d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec948b873489d459ab4b1cde8e709a3e511fffcb
--- /dev/null
+++ b/graph/incidents_graphml/9/94c14d80-0be4-11ef-b512-05786bea65d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.98
+ 100.64.87.98
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715026184
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94c14d80-0be4-11ef-b512-05786bea65d3
+
+
+
diff --git a/graph/incidents_graphml/9/94c4c100-dd62-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/9/94c4c100-dd62-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cb357805ee1c3f3b89d445ed8b5ccf6bfd11d43
--- /dev/null
+++ b/graph/incidents_graphml/9/94c4c100-dd62-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,768 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.14.223
+ 100.64.14.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.15.190
+ 100.64.15.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.185
+ 100.64.8.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.78
+ 100.64.96.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.79
+ 100.64.96.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.80
+ 100.64.96.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.64
+ USER-0015-2149.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.45.129
+ 100.64.45.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.81
+ USER-0015-2150.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.82
+ 100.64.96.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.39
+ 100.64.13.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.83
+ 100.64.96.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.73
+ 100.64.66.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.72
+ 100.64.22.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.228
+ 100.64.12.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.84
+ 100.64.96.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.85
+ 100.64.96.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.915625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94c4c100-dd62-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/9/94ca9820-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/94ca9820-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f08763ab21d833e3cf42553d1ef7f8a89694ee2
--- /dev/null
+++ b/graph/incidents_graphml/9/94ca9820-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.209
+ 100.64.18.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849322
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 94ca9820-6fab-11ee-8e98-1955c57dee13
+
+
+ INCIDENT_LINK
+ 1697849322
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 94ca9820-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/9/94cd1760-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/94cd1760-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a54ed4e53bb5206794ab4c675c18809d1df83fb8
--- /dev/null
+++ b/graph/incidents_graphml/9/94cd1760-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 94cd1760-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14.graphml b/graph/incidents_graphml/9/94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaf5bde1b411c581c746fc351696a4323849e85f
--- /dev/null
+++ b/graph/incidents_graphml/9/94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.146
+ 100.64.70.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.70.147
+ 100.64.70.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.148
+ 100.64.70.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.149
+ 100.64.70.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.11.104
+ 100.64.11.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703819326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 94d18bd0-a5f7-11ee-bc9b-590f3fe4ac14
+
+
+
diff --git a/graph/incidents_graphml/9/94d97570-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/94d97570-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8003eccff10e1f09ecd687ee5188458225fb4703
--- /dev/null
+++ b/graph/incidents_graphml/9/94d97570-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262990
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 94d97570-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/94e0b600-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/9/94e0b600-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1493e6a3cca2eceaac0a18e47c6302af22b56497
--- /dev/null
+++ b/graph/incidents_graphml/9/94e0b600-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.133
+ 100.64.53.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.48
+ 100.64.37.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.134
+ 100.64.53.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.135
+ 100.64.53.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.136
+ 100.64.53.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.137
+ 100.64.53.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211589
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94e0b600-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/9/94ebb6d0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/94ebb6d0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..319a1f52ce688874f7d1f727f82ffc5ce1e40b8e
--- /dev/null
+++ b/graph/incidents_graphml/9/94ebb6d0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.141
+ 100.64.52.141
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704382397
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 94ebb6d0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/94efc2d0-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/94efc2d0-a813-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38cee3a3424f24f6ddf470141e50b670ae76a57b
--- /dev/null
+++ b/graph/incidents_graphml/9/94efc2d0-a813-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.246
+ 100.64.68.246
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.27.200
+ 100.64.27.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.247
+ 100.64.68.247
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94efc2d0-a813-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/9/94f06fd0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/9/94f06fd0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47ca9ae6eb0d786d2de36bda29f0cac9af481bca
--- /dev/null
+++ b/graph/incidents_graphml/9/94f06fd0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.126
+ 100.64.81.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94f06fd0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+ INCIDENT_LINK
+ 1681490650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94f06fd0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/9/94f08e20-4af5-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/9/94f08e20-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcd7e94fe6ab2bb2e70a1d46290a18006611c1a5
--- /dev/null
+++ b/graph/incidents_graphml/9/94f08e20-4af5-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,62 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.53
+ 100.64.89.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693812912
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 94f08e20-4af5-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/9/9501afd0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/9501afd0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27698a34187412df162f477cd8f1f8cc7f4b543c
--- /dev/null
+++ b/graph/incidents_graphml/9/9501afd0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.52.141
+ 100.64.52.141
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704382397
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9501afd0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/95028bd0-956d-11ee-b530-efbdfde16867.graphml b/graph/incidents_graphml/9/95028bd0-956d-11ee-b530-efbdfde16867.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b91d97e1dce43051fa8b56ae3e2df1f1fbe91af
--- /dev/null
+++ b/graph/incidents_graphml/9/95028bd0-956d-11ee-b530-efbdfde16867.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.127
+ USER-0015-1264.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702000837
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95028bd0-956d-11ee-b530-efbdfde16867
+
+
+
diff --git a/graph/incidents_graphml/9/950808b0-10ff-11ed-87b3-2f5c2a8265d8.graphml b/graph/incidents_graphml/9/950808b0-10ff-11ed-87b3-2f5c2a8265d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7221ec3ded968a851d717d1e1e341d82baa5da5
--- /dev/null
+++ b/graph/incidents_graphml/9/950808b0-10ff-11ed-87b3-2f5c2a8265d8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.112
+ 100.64.81.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.36
+ 100.64.1.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.113
+ 100.64.81.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659292542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 950808b0-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 950808b0-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 950808b0-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 950808b0-10ff-11ed-87b3-2f5c2a8265d8
+
+
+
diff --git a/graph/incidents_graphml/9/9509c7c0-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/9509c7c0-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb88e6687d24bbf0f85290fe78e3ecb0a8d1d7c1
--- /dev/null
+++ b/graph/incidents_graphml/9/9509c7c0-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.232
+ 100.64.9.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972456
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9509c7c0-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/9509e9a0-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/9509e9a0-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4b5502bf06d76f632c6e98dd58fcc61ea344fb6
--- /dev/null
+++ b/graph/incidents_graphml/9/9509e9a0-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.59
+ 100.64.80.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660593917
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9509e9a0-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/950d6c10-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/950d6c10-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59882e1baa161a6c4482146ae59bd54994310cf1
--- /dev/null
+++ b/graph/incidents_graphml/9/950d6c10-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.59
+ 100.64.80.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660593917
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 950d6c10-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/9510d720-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/9510d720-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..030cbcdc4cba6601c674e797babc248310725485
--- /dev/null
+++ b/graph/incidents_graphml/9/9510d720-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.111
+ 100.64.16.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9510d720-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/9519a1e0-48f0-11ee-92d0-699b2a8ba251.graphml b/graph/incidents_graphml/9/9519a1e0-48f0-11ee-92d0-699b2a8ba251.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de93b58f574466112f5a3764e3660d120b2e3497
--- /dev/null
+++ b/graph/incidents_graphml/9/9519a1e0-48f0-11ee-92d0-699b2a8ba251.graphml
@@ -0,0 +1,495 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.48
+ 100.64.9.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.107
+ 100.64.38.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.108
+ 100.64.38.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.14
+ 100.64.35.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.109
+ 100.64.38.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.110
+ 100.64.38.110
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.111
+ 100.64.38.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.112
+ 100.64.38.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.68
+ 100.64.30.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.113
+ 100.64.38.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.114
+ 100.64.38.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+ INCIDENT_LINK
+ 1693590862
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9519a1e0-48f0-11ee-92d0-699b2a8ba251
+
+
+
diff --git a/graph/incidents_graphml/9/9523f550-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/9/9523f550-117d-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f662cfc47cb2a2a44bcd0102cdc649138a946880
--- /dev/null
+++ b/graph/incidents_graphml/9/9523f550-117d-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.241
+ 100.64.46.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.252
+ 100.64.10.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9523f550-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9523f550-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9523f550-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9523f550-117d-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/9/952517f0-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/952517f0-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37c26212e4b8aad4d01df717a9527b86f626df11
--- /dev/null
+++ b/graph/incidents_graphml/9/952517f0-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972456
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 952517f0-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/952e9850-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/952e9850-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..182aa19de4df863435da8b572e6a8eb560590eb4
--- /dev/null
+++ b/graph/incidents_graphml/9/952e9850-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,173 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+ INCIDENT_LINK
+ 1693151487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 952e9850-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/952f6420-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/952f6420-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2991442523c40fe9e3ebf903b6f8696ca097eb4b
--- /dev/null
+++ b/graph/incidents_graphml/9/952f6420-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.8
+ 100.64.82.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691098063
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 952f6420-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/9532faa0-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/9532faa0-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83f91f86a0ecefacb10592276d2b4164b8e04940
--- /dev/null
+++ b/graph/incidents_graphml/9/9532faa0-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972456
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9532faa0-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/9534be30-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/9/9534be30-117d-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d54bbe6523b8e193d6a607a755b8c8049df08b8b
--- /dev/null
+++ b/graph/incidents_graphml/9/9534be30-117d-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.149
+ USER-0015-1440.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.150
+ 100.64.60.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9534be30-117d-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/9/953668c0-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/953668c0-a813-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee8f3a602ef065ba72ebd207c8a7506b4f8986fd
--- /dev/null
+++ b/graph/incidents_graphml/9/953668c0-a813-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.248
+ 100.64.68.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 953668c0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 953668c0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 953668c0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 953668c0-a813-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/9/95377a30-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/95377a30-a813-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b045f0707abc9be94a9488202cd52af9cfec7655
--- /dev/null
+++ b/graph/incidents_graphml/9/95377a30-a813-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.249
+ 100.64.68.249
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.250
+ 100.64.68.250
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95377a30-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95377a30-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95377a30-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051255
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95377a30-a813-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/9/95381770-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/9/95381770-221a-11ef-a5a3-b5bcb77a69cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a94ea242009c255c1d2c8d7aee35a927fda247af
--- /dev/null
+++ b/graph/incidents_graphml/9/95381770-221a-11ef-a5a3-b5bcb77a69cd.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.44
+ 100.64.15.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717468304
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95381770-221a-11ef-a5a3-b5bcb77a69cd
+
+
+ INCIDENT_LINK
+ 1717468304
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95381770-221a-11ef-a5a3-b5bcb77a69cd
+
+
+
diff --git a/graph/incidents_graphml/9/95495580-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/9/95495580-221a-11ef-a5a3-b5bcb77a69cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8f9c6edabfd1ecb1ed93ac6292579d62e48b56c
--- /dev/null
+++ b/graph/incidents_graphml/9/95495580-221a-11ef-a5a3-b5bcb77a69cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.44
+ 100.64.15.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717468304
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95495580-221a-11ef-a5a3-b5bcb77a69cd
+
+
+
diff --git a/graph/incidents_graphml/9/955317e0-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/955317e0-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fd4a6f8ab7d488d43d8a56761edaa35ddd90eb5
--- /dev/null
+++ b/graph/incidents_graphml/9/955317e0-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.190
+ 100.64.54.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.62
+ 100.64.72.62
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660064348
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 955317e0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064348
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 955317e0-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/9557d3b0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/9557d3b0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e8b252167f97de16242c1ac24965c474495bf5b
--- /dev/null
+++ b/graph/incidents_graphml/9/9557d3b0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.8
+ 100.64.82.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098064
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9557d3b0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/955c1a30-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/9/955c1a30-221a-11ef-a5a3-b5bcb77a69cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6cb994a8eaad8e493a0c8b9254fce503731e9dc
--- /dev/null
+++ b/graph/incidents_graphml/9/955c1a30-221a-11ef-a5a3-b5bcb77a69cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.45
+ 100.64.15.45
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717468304
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 955c1a30-221a-11ef-a5a3-b5bcb77a69cd
+
+
+
diff --git a/graph/incidents_graphml/9/9564d6f0-4888-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/9/9564d6f0-4888-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..290c9ba3d133b57e4b6248d4687e3720afb66f5d
--- /dev/null
+++ b/graph/incidents_graphml/9/9564d6f0-4888-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546195
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9564d6f0-4888-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/9/957146a0-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/957146a0-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a44c8bc58febf781168d2d4296e675651bd52bda
--- /dev/null
+++ b/graph/incidents_graphml/9/957146a0-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.191
+ 100.64.22.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 957146a0-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/95744040-4888-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/9/95744040-4888-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4588b4d9bba79d57a1c51d9e06eb2d055bfb80bf
--- /dev/null
+++ b/graph/incidents_graphml/9/95744040-4888-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.67
+ 100.64.16.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546195
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95744040-4888-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/9/957ab060-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/957ab060-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72276facfab71c10ad8b45d96d792c77b56e7dad
--- /dev/null
+++ b/graph/incidents_graphml/9/957ab060-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.242
+ 100.64.85.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704382398
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 957ab060-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/95812da0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/95812da0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8ada0fe351307959e8fad69da7ad5beef35174d
--- /dev/null
+++ b/graph/incidents_graphml/9/95812da0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.6
+ 100.64.77.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.12
+ 100.64.82.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691098064
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95812da0-3244-11ee-b975-db6b43f597fd
+
+
+ INCIDENT_LINK
+ 1691098064
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95812da0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/95833460-4888-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/9/95833460-4888-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..581d539f0a78ccfdc43419ef2db30adca7e6a9eb
--- /dev/null
+++ b/graph/incidents_graphml/9/95833460-4888-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.67
+ 100.64.16.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546195
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95833460-4888-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/9/9584cea0-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/9584cea0-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a972e1c116602dd6766ec762a4c7ce345d5a3fb
--- /dev/null
+++ b/graph/incidents_graphml/9/9584cea0-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.191
+ 100.64.22.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9584cea0-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/9585a450-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9585a450-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62dd207f0a1785c360a688e7b5cbac4259d55fbf
--- /dev/null
+++ b/graph/incidents_graphml/9/9585a450-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.249
+ 100.64.10.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.189
+ USER-0015-1640.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9585a450-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9585a450-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9585a450-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9585a450-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/95898d10-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/95898d10-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73c4927a939e892eab3aed475ec4c559966753d5
--- /dev/null
+++ b/graph/incidents_graphml/9/95898d10-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.91
+ 100.64.68.91
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659714738
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95898d10-14d6-11ed-9c5d-cfc137bdc6da
+
+
+ INCIDENT_LINK
+ 1659714738
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95898d10-14d6-11ed-9c5d-cfc137bdc6da
+
+
+ INCIDENT_LINK
+ 1659714738
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95898d10-14d6-11ed-9c5d-cfc137bdc6da
+
+
+ INCIDENT_LINK
+ 1659714738
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95898d10-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/958dea40-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/958dea40-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4782d750d61e357a3200feb9e74666347de7fb45
--- /dev/null
+++ b/graph/incidents_graphml/9/958dea40-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.85.242
+ 100.64.85.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704382398
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 958dea40-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/95922770-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/95922770-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eafdc27ea80ad4e0c9d72030a7401c85b147761e
--- /dev/null
+++ b/graph/incidents_graphml/9/95922770-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.188
+ 100.64.18.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.190
+ 100.64.72.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95922770-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95922770-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/95954960-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/95954960-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93d373b5b42268896afedff6d0ab800853089184
--- /dev/null
+++ b/graph/incidents_graphml/9/95954960-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.227
+ 100.64.23.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95954960-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/959c6e60-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/959c6e60-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7d782859b74c50f6e8446581ac6a2a020018495
--- /dev/null
+++ b/graph/incidents_graphml/9/959c6e60-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.248
+ 100.64.24.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 959c6e60-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/959ca4e0-3244-11ee-b975-db6b43f597fd.graphml b/graph/incidents_graphml/9/959ca4e0-3244-11ee-b975-db6b43f597fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a50482d3d43400932bf4e0c88ded76f2009c90b
--- /dev/null
+++ b/graph/incidents_graphml/9/959ca4e0-3244-11ee-b975-db6b43f597fd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.10
+ 100.64.82.10
+ ["Exploiting Host"]
+ 0.25
+ ["Meraki","Precinct"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691098064
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 959ca4e0-3244-11ee-b975-db6b43f597fd
+
+
+
diff --git a/graph/incidents_graphml/9/95a1adb0-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/95a1adb0-a813-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6539a492128a9bee44d92632318304c1569e8c4
--- /dev/null
+++ b/graph/incidents_graphml/9/95a1adb0-a813-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.251
+ 100.64.68.251
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.252
+ 100.64.68.252
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.253
+ 100.64.68.253
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704051256
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95a1adb0-a813-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/9/95a573f0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/95a573f0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7183afdfea14cdef8538f826fdd68f27ba1da5aa
--- /dev/null
+++ b/graph/incidents_graphml/9/95a573f0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.147
+ 100.64.28.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95a573f0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/95b4f6b0-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/95b4f6b0-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cd7f622e47080acf359788bc86629739e13772f
--- /dev/null
+++ b/graph/incidents_graphml/9/95b4f6b0-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ 100.64.21.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660593918
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95b4f6b0-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/95ba8560-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/95ba8560-5161-11ed-8537-055dd7dfd795.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e900f3f6543dc2eb318171bb9abd6ef0ccbe432
--- /dev/null
+++ b/graph/incidents_graphml/9/95ba8560-5161-11ed-8537-055dd7dfd795.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.128
+ 100.64.72.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1666371508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95ba8560-5161-11ed-8537-055dd7dfd795
+
+
+
diff --git a/graph/incidents_graphml/9/95bb3840-1cd5-11ed-bff9-25705f07d60b.graphml b/graph/incidents_graphml/9/95bb3840-1cd5-11ed-bff9-25705f07d60b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3035b830e26c5730a62f3e5a07b080f399eedb7f
--- /dev/null
+++ b/graph/incidents_graphml/9/95bb3840-1cd5-11ed-bff9-25705f07d60b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.149
+ 100.64.21.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660593918
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95bb3840-1cd5-11ed-bff9-25705f07d60b
+
+
+
diff --git a/graph/incidents_graphml/9/95c1d0b0-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/95c1d0b0-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3a9ecb4131e4c6a8536b90bb55d450dff9746d9
--- /dev/null
+++ b/graph/incidents_graphml/9/95c1d0b0-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.102
+ 100.64.15.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95c1d0b0-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/95c2bff0-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/95c2bff0-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f304c118535cb8a5d5ba0db006bd6ec8dddd85bf
--- /dev/null
+++ b/graph/incidents_graphml/9/95c2bff0-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.147
+ 100.64.28.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071103
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95c2bff0-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/95c6be30-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/95c6be30-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05644a761639bbf3bcea0b0ea433b4c8e94870bc
--- /dev/null
+++ b/graph/incidents_graphml/9/95c6be30-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.67
+ 100.64.49.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348426
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95c6be30-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/95ca3820-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/9/95ca3820-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbb51e1329f0339c9810d15dc87873183ad14190
--- /dev/null
+++ b/graph/incidents_graphml/9/95ca3820-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.201
+ 100.64.80.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ 100.64.1.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687449060
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ca3820-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449060
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ca3820-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/9/95ceb340-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/95ceb340-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38d72b536e649fe8fb729709a995a268a2661d17
--- /dev/null
+++ b/graph/incidents_graphml/9/95ceb340-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115348
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95ceb340-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/95d0d0a0-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/95d0d0a0-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e85c1bcb907f3b47c3d6ff41dcf0d80690d03e2c
--- /dev/null
+++ b/graph/incidents_graphml/9/95d0d0a0-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.178.143
+ USER-0015-1849.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.154.170
+ USER-0015-1850.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.0.111
+ 100.64.0.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 95d0d0a0-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 95d0d0a0-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 95d0d0a0-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 95d0d0a0-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/95d1f680-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/95d1f680-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1cbff62c767ae287a41d5a7df22c4f50bb24c55
--- /dev/null
+++ b/graph/incidents_graphml/9/95d1f680-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.125.108.80
+ 10.125.108.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.75
+ 100.64.79.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690196551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95d1f680-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95d1f680-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/95dbef50-44f1-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/9/95dbef50-44f1-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c16c98e7163b2ea02e35ef14e41855483fe4cfd0
--- /dev/null
+++ b/graph/incidents_graphml/9/95dbef50-44f1-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.190
+ 100.64.35.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693151488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95dbef50-44f1-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/9/95e18800-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/95e18800-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b530e52ae1d98a505239e7f5a7a45890ecc6d6ad
--- /dev/null
+++ b/graph/incidents_graphml/9/95e18800-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.113
+ 100.64.39.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224011
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95e18800-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/95e36270-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/95e36270-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..560c829a449d670a7b5464becb20e23efd4bcf9d
--- /dev/null
+++ b/graph/incidents_graphml/9/95e36270-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.102
+ 100.64.15.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 95e36270-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/95e6d560-724f-11ee-ae98-3f997ba4fd8d.graphml b/graph/incidents_graphml/9/95e6d560-724f-11ee-ae98-3f997ba4fd8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7eb83e387bf833e103104e79ef4d94ff90d77ac
--- /dev/null
+++ b/graph/incidents_graphml/9/95e6d560-724f-11ee-ae98-3f997ba4fd8d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.217
+ 100.64.35.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698139663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 95e6d560-724f-11ee-ae98-3f997ba4fd8d
+
+
+
diff --git a/graph/incidents_graphml/9/95ec85b0-6a83-11ee-8b64-8bde2abad778.graphml b/graph/incidents_graphml/9/95ec85b0-6a83-11ee-8b64-8bde2abad778.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c50f60d66e539adaaf62eb32f3a305021ad0d92e
--- /dev/null
+++ b/graph/incidents_graphml/9/95ec85b0-6a83-11ee-8b64-8bde2abad778.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.229
+ 100.64.43.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.230
+ 100.64.43.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.165
+ 100.64.14.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.187
+ 100.64.35.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.231
+ 100.64.43.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.232
+ 100.64.43.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95ec85b0-6a83-11ee-8b64-8bde2abad778
+
+
+
diff --git a/graph/incidents_graphml/9/95f4ba90-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/95f4ba90-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b974497cb8b83b2cdfd3732abf5c17b9d4e3d134
--- /dev/null
+++ b/graph/incidents_graphml/9/95f4ba90-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.35
+ 100.64.34.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 95f4ba90-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/96006050-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96006050-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93a0f9e070770d7603af6b2fe1ff6a58c59cd161
--- /dev/null
+++ b/graph/incidents_graphml/9/96006050-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.22
+ USER-0015-1296.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000105
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96006050-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/96049910-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/96049910-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16e85aeca7e08981aef9bb72d5a236e9d29014d1
--- /dev/null
+++ b/graph/incidents_graphml/9/96049910-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.35
+ 100.64.34.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96049910-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/960d1910-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/960d1910-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39c9107252a65b16dd207aed1c6dece7c5433539
--- /dev/null
+++ b/graph/incidents_graphml/9/960d1910-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.79
+ 100.64.72.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.209
+ 100.64.73.209
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.210
+ 100.64.73.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.211
+ 100.64.73.211
+ []
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.212
+ 100.64.73.212
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.213
+ 100.64.73.213
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.214
+ 100.64.73.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.215
+ 100.64.73.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 960d1910-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/96135aa0-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/96135aa0-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbf51a2c483dcadd928c3094e83f9ac8d124f830
--- /dev/null
+++ b/graph/incidents_graphml/9/96135aa0-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.27.131
+ 100.64.27.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.216
+ 100.64.73.216
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.217
+ 100.64.73.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.218
+ 100.64.73.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064349
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96135aa0-1804-11ed-8708-35bec77a7d27
+
+
+