f15hb0wn commited on
Commit
3ce036d
·
verified ·
1 Parent(s): 9080700

Upload per-incident GraphML sharded batch 9/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml +63 -0
  2. graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml +63 -0
  3. graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml +85 -0
  4. graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml +77 -0
  5. graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  6. graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml +63 -0
  7. graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml +63 -0
  8. graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml +63 -0
  9. graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml +63 -0
  10. graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml +63 -0
  11. graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml +77 -0
  12. graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml +113 -0
  13. graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml +63 -0
  14. graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml +63 -0
  15. graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml +63 -0
  16. graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml +63 -0
  17. graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml +63 -0
  18. graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml +63 -0
  19. graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml +63 -0
  20. graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml +63 -0
  21. graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml +63 -0
  22. graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml +63 -0
  23. graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml +63 -0
  24. graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml +63 -0
  25. graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml +63 -0
  26. graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml +63 -0
  27. graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml +63 -0
  28. graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml +63 -0
  29. graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml +63 -0
  30. graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml +63 -0
  31. graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml +149 -0
  32. graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  33. graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml +77 -0
  34. graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml +63 -0
  35. graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml +63 -0
  36. graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  37. graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml +63 -0
  38. graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  39. graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml +77 -0
  40. graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  41. graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml +113 -0
  42. graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml +63 -0
  43. graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml +645 -0
  44. graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml +63 -0
  45. graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml +63 -0
  46. graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml +293 -0
  47. graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml +135 -0
  48. graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml +63 -0
  49. graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml +63 -0
  50. graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml +77 -0
graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e732-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.37.38</data>
35
+ <data key="n_hostname">100.64.37.38</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="2bd2e732-0626-11ee-b19f-ed665a42340f" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686257093</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52123240-063d-11ee-a6b9-2fa958ecde6f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a76644a2-139b-11ee-9633-0bc37fed8e1a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.170</data>
35
+ <data key="n_hostname">100.64.91.170</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">100.64.86.69</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="a76644a2-139b-11ee-9633-0bc37fed8e1a" target="HOST-17001">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694583317</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">5212cd80-51f7-11ee-8f5a-e9a9bd036d73</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1e15a3a0-1065-11ee-b437-61f5cc5f106b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.62.21</data>
35
+ <data key="n_hostname">100.64.62.21</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.229.11</data>
51
+ <data key="n_hostname">172.30.229.11</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="1e15a3a0-1065-11ee-b437-61f5cc5f106b" target="HOST-2842">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1697259511</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">521475d0-6a4e-11ee-a1cb-53f21743b64f</data>
69
+ </edge>
70
+ <edge id="e2" source="1e15a3a0-1065-11ee-b437-61f5cc5f106b" target="HOST-2750">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1697259511</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">521475d0-6a4e-11ee-a1cb-53f21743b64f</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="65da5ea2-0634-11ee-9d07-cb1ebf50eef9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.54</data>
35
+ <data key="n_hostname">100.64.75.54</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="5cd31af3-1295-11ee-b5ea-d72d376077e2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.82.228</data>
43
+ <data key="n_hostname">100.64.82.228</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="65da5ea2-0634-11ee-9d07-cb1ebf50eef9" target="5cd31af3-1295-11ee-b5ea-d72d376077e2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687776223</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">521e9e20-140e-11ee-aa1e-3bafa1120b8e</data>
61
+ </edge>
62
+ <edge id="e2" source="5cd31af3-1295-11ee-b5ea-d72d376077e2" target="65da5ea2-0634-11ee-9d07-cb1ebf50eef9">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687776223</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">521e9e20-140e-11ee-aa1e-3bafa1120b8e</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="55d38114-07df-11ee-b518-d77076496b2c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.47.51</data>
43
+ <data key="n_hostname">100.64.47.51</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="55d38114-07df-11ee-b518-d77076496b2c">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101491</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">521eb840-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">100.64.86.69</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="a76644a2-139b-11ee-9633-0bc37fed8e1a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.170</data>
43
+ <data key="n_hostname">100.64.91.170</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17001" target="HOST-18165">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694583317</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">522236d0-51f7-11ee-8f5a-e9a9bd036d73</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7c8d94a2-0639-11ee-b77d-ed2202f62b77">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.37.36</data>
35
+ <data key="n_hostname">100.64.37.36</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="60674a92-0626-11ee-a360-0d0424c09388">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6816" target="HOST-4399">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686257093</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">522bfbd0-063d-11ee-a6b9-2fa958ecde6f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da186dd0-1056-11ee-824a-e5bb4f313279">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.24</data>
35
+ <data key="n_hostname">100.64.21.24</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="8b9c8026-16c2-11ee-9a3d-155decbf9031">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">USER-0015-1974.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="da186dd0-1056-11ee-824a-e5bb4f313279" target="HOST-17126">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689357630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">522df850-2270-11ee-9fd4-59af0d5e8a32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d9d13f39-51df-11ee-a685-23e22d6db76d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.173</data>
35
+ <data key="n_hostname">100.64.91.173</data>
36
+ <data key="n_set_roles">["Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">100.64.86.72</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="d9d13f39-51df-11ee-a685-23e22d6db76d" target="HOST-17156">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694583317</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">522fa450-51f7-11ee-8f5a-e9a9bd036d73</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5186c734-b6d5-11ed-8f08-01e6f26c43de">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.94.192</data>
35
+ <data key="n_hostname">100.64.94.192</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="5186c734-b6d5-11ed-8f08-01e6f26c43de" target="HOST-16902">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677526284</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">523110f0-b6d5-11ed-b037-89e5a8e9b2b8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="817946b1-063b-11ee-93e5-c7d42ca5d975">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.1.40</data>
35
+ <data key="n_hostname">100.64.1.40</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="f06db0b0-0668-11ee-a546-37195b9911bc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.48.19</data>
43
+ <data key="n_hostname">100.64.48.19</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-15634" target="HOST-15619">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687776223</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52331080-140e-11ee-aa1e-3bafa1120b8e</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-15619" target="HOST-15634">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687776223</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">52331080-140e-11ee-aa1e-3bafa1120b8e</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5f49e4f0-062c-11ee-9b78-7f958e17b9fb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.216.82</data>
35
+ <data key="n_hostname">172.25.216.82</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="5d6fcdc4-062c-11ee-b82d-632750aaebb4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.242</data>
43
+ <data key="n_hostname">100.64.87.242</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="5e734f92-035a-11ef-a109-a1bf3e794601">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.94.163</data>
51
+ <data key="n_hostname">100.64.94.163</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-17294" target="5d6fcdc4-062c-11ee-b82d-632750aaebb4">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1714983553</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">5234e660-0b81-11ef-b87c-0d8b17cd9fbf</data>
69
+ </edge>
70
+ <edge id="e2" source="5d6fcdc4-062c-11ee-b82d-632750aaebb4" target="HOST-17294">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1714983553</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">5234e660-0b81-11ef-b87c-0d8b17cd9fbf</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-17294" target="5e734f92-035a-11ef-a109-a1bf3e794601">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1714983553</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.25</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Unprocessed</data>
96
+ <data key="e_incident_id">5234e660-0b81-11ef-b87c-0d8b17cd9fbf</data>
97
+ </edge>
98
+ <edge id="e4" source="5e734f92-035a-11ef-a109-a1bf3e794601" target="HOST-17294">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1714983553</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.25</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Unprocessed</data>
110
+ <data key="e_incident_id">5234e660-0b81-11ef-b87c-0d8b17cd9fbf</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">100.64.86.72</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="d9d13f39-51df-11ee-a685-23e22d6db76d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.173</data>
43
+ <data key="n_hostname">100.64.91.173</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17156" target="HOST-18166">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694583317</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">523e9870-51f7-11ee-8f5a-e9a9bd036d73</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8b9c8026-16c2-11ee-9a3d-155decbf9031">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">USER-0015-1974.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="da186dd0-1056-11ee-824a-e5bb4f313279">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.21.24</data>
43
+ <data key="n_hostname">100.64.21.24</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17126" target="HOST-18129">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689357630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52483710-2270-11ee-9fd4-59af0d5e8a32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6e02c955-062f-11ee-a083-efa570891c5e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.190</data>
35
+ <data key="n_hostname">100.64.20.190</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="6e02c955-062f-11ee-a083-efa570891c5e" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698424736</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52545530-74e7-11ee-97b8-bd3e826c3a7b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5dff8ed2-0625-11ee-bb59-61e1854d46e6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.36</data>
35
+ <data key="n_hostname">100.64.68.36</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","CASB","Protect"]</data>
39
+ </node>
40
+ <node id="91078a16-70c6-11ee-bec1-0d15e26bb1e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.6.206</data>
43
+ <data key="n_hostname">100.64.6.206</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11409" target="91078a16-70c6-11ee-bec1-0d15e26bb1e4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714073879</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52585850-033b-11ef-835b-a3623a295d8b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d2145701-eb42-11ec-8754-01dd07e2fd06">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.151</data>
35
+ <data key="n_hostname">100.64.80.151</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="d2145701-eb42-11ec-8754-01dd07e2fd06" target="HOST-12604">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660796098</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">5260fed0-1eac-11ed-b576-2ddb0d65fe5a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.214.148</data>
35
+ <data key="n_hostname">172.30.214.148</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6e02c955-062f-11ee-a083-efa570891c5e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.20.190</data>
43
+ <data key="n_hostname">100.64.20.190</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2720" target="HOST-4558">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698424736</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5263be80-74e7-11ee-97b8-bd3e826c3a7b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="76333fc0-0629-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.199</data>
35
+ <data key="n_hostname">USER-0015-1270.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5662" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686473560</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5264a300-0835-11ee-9239-4117e3175884</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="d2145701-eb42-11ec-8754-01dd07e2fd06">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.80.151</data>
43
+ <data key="n_hostname">100.64.80.151</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="HOST-15665">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660796098</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5268ee10-1eac-11ed-b576-2ddb0d65fe5a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">100.64.86.72</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="5029c231-51f7-11ee-9833-59e3488ba970">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.175</data>
43
+ <data key="n_hostname">100.64.91.175</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17156" target="5029c231-51f7-11ee-9833-59e3488ba970">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694583317</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">526f6c70-51f7-11ee-8f5a-e9a9bd036d73</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="28e06e04-3a22-11ee-ac20-b1821ab11b44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.206</data>
35
+ <data key="n_hostname">100.64.14.206</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3750" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715443973</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5273e610-0fb1-11ef-ba57-a7da65bcbce4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="76333fc0-0629-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.199</data>
43
+ <data key="n_hostname">USER-0015-1270.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-5662">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686473560</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">528179d0-0835-11ee-9239-4117e3175884</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="28e06e04-3a22-11ee-ac20-b1821ab11b44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.206</data>
43
+ <data key="n_hostname">100.64.14.206</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-3750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715443974</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5284aef0-0fb1-11ef-ba57-a7da65bcbce4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a55e0853-0644-11ee-844e-e5bb1e3b4925">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.47.149</data>
43
+ <data key="n_hostname">100.64.47.149</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-8361">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694518034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">528d02a0-515f-11ee-9251-b53d19eaa2b9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4a6b1640-0626-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.65.38</data>
35
+ <data key="n_hostname">100.64.65.38</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="4a6b1640-0626-11ee-b404-ff2ea490fc35" target="HOST-2761">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712528120</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">528ef210-f52c-11ee-9bad-936e2aee478a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="58ca5721-cf46-11ee-8f23-f3a5a503aabd">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.39</data>
35
+ <data key="n_hostname">100.64.15.39</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="58ca5721-cf46-11ee-8f23-f3a5a503aabd" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715443974</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52943f50-0fb1-11ef-ba57-a7da65bcbce4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4a6b1640-0626-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.65.38</data>
43
+ <data key="n_hostname">100.64.65.38</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="HOST-10934">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712528120</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52a0f370-f52c-11ee-9bad-936e2aee478a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0e8e2412-0847-11ed-8059-59201773db39">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.155</data>
35
+ <data key="n_hostname">100.64.80.155</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="0e8e2412-0847-11ed-8059-59201773db39" target="HOST-12604">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660796098</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52a35f00-1eac-11ed-b576-2ddb0d65fe5a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a94ae550-09e6-11ee-b49d-b96108c0922e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.238</data>
35
+ <data key="n_hostname">100.64.52.238</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a94ae550-09e6-11ee-b49d-b96108c0922e" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694518034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52aac3d0-515f-11ee-9251-b53d19eaa2b9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="56cc99f4-0625-11ee-ae19-679f8bc2c45f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.28</data>
35
+ <data key="n_hostname">100.64.68.28</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
39
+ </node>
40
+ <node id="441d4504-09ba-11ee-b44f-dfdd7e484c0f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.62.242</data>
43
+ <data key="n_hostname">USER-0015-1521.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.49375</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="180700e4-0c3b-11ee-8903-a50831ca8a14">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.69.125</data>
51
+ <data key="n_hostname">100.64.69.125</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="531e5951-0775-11ee-9e6d-b7fdb2774bfc">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.23.158</data>
59
+ <data key="n_hostname">100.64.23.158</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-11400" target="441d4504-09ba-11ee-b44f-dfdd7e484c0f">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1689214179</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.746875</data>
69
+ <data key="e_suspicion_score">0.746875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
77
+ </edge>
78
+ <edge id="e2" source="441d4504-09ba-11ee-b44f-dfdd7e484c0f" target="HOST-11400">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1689214179</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.746875</data>
83
+ <data key="e_suspicion_score">0.746875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
91
+ </edge>
92
+ <edge id="e3" source="180700e4-0c3b-11ee-8903-a50831ca8a14" target="HOST-11400">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1689214179</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.746875</data>
97
+ <data key="e_suspicion_score">0.746875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-11400" target="180700e4-0c3b-11ee-8903-a50831ca8a14">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1689214179</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.746875</data>
111
+ <data key="e_suspicion_score">0.746875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
119
+ </edge>
120
+ <edge id="e5" source="531e5951-0775-11ee-9e6d-b7fdb2774bfc" target="HOST-11400">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1689214179</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.746875</data>
125
+ <data key="e_suspicion_score">0.746875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-11400" target="531e5951-0775-11ee-9e6d-b7fdb2774bfc">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1689214179</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.746875</data>
139
+ <data key="e_suspicion_score">0.746875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">52aae440-2122-11ee-9a61-05dd24aa353e</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0e2c3470-246c-11ee-8211-5b1c3e4a84b8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.38</data>
35
+ <data key="n_hostname">100.64.11.38</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3265" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101492</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52adb1d0-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e022b051-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.201</data>
35
+ <data key="n_hostname">100.64.76.201</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="3e55e5d0-ea9b-11ec-8129-6f97d7a3ee77">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.51.2</data>
43
+ <data key="n_hostname">100.64.51.2</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-14231" target="3e55e5d0-ea9b-11ec-8129-6f97d7a3ee77">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661506056</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52ade530-2521-11ed-8e05-13976c823138</data>
61
+ </edge>
62
+ <edge id="e2" source="3e55e5d0-ea9b-11ec-8129-6f97d7a3ee77" target="HOST-14231">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1661506056</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">52ade530-2521-11ed-8e05-13976c823138</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="0e8e2412-0847-11ed-8059-59201773db39">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.80.155</data>
43
+ <data key="n_hostname">100.64.80.155</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="HOST-15666">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660796098</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52ae0d60-1eac-11ed-b576-2ddb0d65fe5a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="52178941-ba69-11ed-ab6d-2bf19a5b2170">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.83.56</data>
35
+ <data key="n_hostname">100.64.83.56</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="6b138613-9d8b-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.255</data>
43
+ <data key="n_hostname">100.64.73.255</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="52178941-ba69-11ed-ab6d-2bf19a5b2170" target="HOST-16446">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677919704</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52b68860-ba69-11ed-ace2-c7d81fb15087</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0e2c3470-246c-11ee-8211-5b1c3e4a84b8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.38</data>
43
+ <data key="n_hostname">100.64.11.38</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-3265">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101492</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52be0580-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a94ae550-09e6-11ee-b49d-b96108c0922e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.238</data>
43
+ <data key="n_hostname">100.64.52.238</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-9137">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694518034</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52c43f40-515f-11ee-9251-b53d19eaa2b9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bbef8bb3-062c-11ee-9c31-59b26f9744a8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.47.55</data>
35
+ <data key="n_hostname">100.64.47.55</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bbef8bb3-062c-11ee-9c31-59b26f9744a8" target="HOST-2773">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101492</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">52cad6c0-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4e906001-fd48-11ec-b0a7-f141721e6bf0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.177</data>
35
+ <data key="n_hostname">100.64.81.177</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e373d720-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.137</data>
43
+ <data key="n_hostname">100.64.72.137</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="4e906001-fd48-11ec-b0a7-f141721e6bf0" target="HOST-14038">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1659285988</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52d85c60-10f0-11ed-9f22-2fed65d2efbb</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14038" target="4e906001-fd48-11ec-b0a7-f141721e6bf0">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1659285988</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">52d85c60-10f0-11ed-9f22-2fed65d2efbb</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.117.12.163</data>
35
+ <data key="n_hostname">10.117.12.163</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="bbef8bb3-062c-11ee-9c31-59b26f9744a8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.47.55</data>
43
+ <data key="n_hostname">100.64.47.55</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2773" target="HOST-8306">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101492</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52d8e080-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da741e80-04dd-11ed-9f60-1f60c8aa6792">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.157</data>
35
+ <data key="n_hostname">100.64.80.157</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="dbcd38e0-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.161</data>
43
+ <data key="n_hostname">100.64.72.161</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="998dd344-eb81-11ec-a779-b361cd3361fc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.80.158</data>
51
+ <data key="n_hostname">100.64.80.158</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="da741e80-04dd-11ed-9f60-1f60c8aa6792" target="HOST-15062">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1660796099</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">52e5bf30-1eac-11ed-b576-2ddb0d65fe5a</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-15062" target="da741e80-04dd-11ed-9f60-1f60c8aa6792">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1660796099</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">52e5bf30-1eac-11ed-b576-2ddb0d65fe5a</data>
83
+ </edge>
84
+ <edge id="e3" source="998dd344-eb81-11ec-a779-b361cd3361fc" target="HOST-15062">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1660796099</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">52e5bf30-1eac-11ed-b576-2ddb0d65fe5a</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-15062" target="998dd344-eb81-11ec-a779-b361cd3361fc">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1660796099</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">52e5bf30-1eac-11ed-b576-2ddb0d65fe5a</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8e5af181-0627-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.37.129</data>
43
+ <data key="n_hostname">100.64.37.129</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="HOST-6870">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700101492</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">52e822c0-8427-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml ADDED
@@ -0,0 +1,645 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c74178b0-28f5-11ef-8bb2-29f43403edd4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.38.43</data>
35
+ <data key="n_hostname">100.64.38.43</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d434d283-2c1d-11ef-91f1-359cfd948649">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <node id="0a367a10-2ce5-11ef-83f4-872fb6b11cce">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.90.192</data>
51
+ <data key="n_hostname">USER-0015-2050.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="55484ad3-3cab-11ef-80b1-bb7858a9471f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.90.193</data>
59
+ <data key="n_hostname">100.64.90.193</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="4f5703b1-2dc3-11ef-aad1-5952a206f5bc">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">10.184.211.180</data>
67
+ <data key="n_hostname">10.184.211.180</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
71
+ </node>
72
+ <node id="31f127b1-2a21-11ef-a694-9d4c9ac3bf97">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.56.93</data>
75
+ <data key="n_hostname">100.64.56.93</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="3c426ee3-28f5-11ef-b508-d5f28f979331">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.90.194</data>
83
+ <data key="n_hostname">100.64.90.194</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="6a6bdfd2-36c0-11ef-93b9-391d3da4dc4b">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.90.195</data>
91
+ <data key="n_hostname">100.64.90.195</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="91df54e6-2980-11ef-9dee-030b9613d80b">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.90.196</data>
99
+ <data key="n_hostname">USER-0015-2051.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="3d38a005-2948-11ef-8b8a-d56510f33f2d">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.5.55</data>
107
+ <data key="n_hostname">100.64.5.55</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.4375</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="5d22cb81-2bae-11ef-a950-4769d5827564">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">10.221.82.8</data>
115
+ <data key="n_hostname">10.221.82.8</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.841796875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
119
+ </node>
120
+ <node id="506766a8-28ff-11ef-9756-cd5dc44cf1c0">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.12.90</data>
123
+ <data key="n_hostname">100.64.12.90</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.71875</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="be0e72a4-2938-11ef-ab17-b3fec31a5042">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.49.207</data>
131
+ <data key="n_hostname">100.64.49.207</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="de2923d2-32cc-11ef-9fe9-697860fae7ca">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.22.197</data>
139
+ <data key="n_hostname">100.64.22.197</data>
140
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="b58a3be2-2907-11ef-a6b4-9361fc70d2ef">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.86.178</data>
147
+ <data key="n_hostname">100.64.86.178</data>
148
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
149
+ <data key="n_suspicion_score">0.71875</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="7b4ea4e8-2d06-11ef-a924-bf8e7742a8e0">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.90.197</data>
155
+ <data key="n_hostname">USER-0015-2052.example.internal</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.4375</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="50999f90-2912-11ef-9502-4dd424261eba">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.28.106</data>
163
+ <data key="n_hostname">100.64.28.106</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.71875</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <edge id="e1" source="c74178b0-28f5-11ef-8bb2-29f43403edd4" target="HOST-17160">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1720389200</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.841796875</data>
173
+ <data key="e_suspicion_score">0.841796875</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
181
+ </edge>
182
+ <edge id="e2" source="HOST-17160" target="c74178b0-28f5-11ef-8bb2-29f43403edd4">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1720389200</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.841796875</data>
187
+ <data key="e_suspicion_score">0.841796875</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
195
+ </edge>
196
+ <edge id="e3" source="0a367a10-2ce5-11ef-83f4-872fb6b11cce" target="HOST-17160">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1720389200</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.841796875</data>
201
+ <data key="e_suspicion_score">0.841796875</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
209
+ </edge>
210
+ <edge id="e4" source="HOST-17160" target="0a367a10-2ce5-11ef-83f4-872fb6b11cce">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1720389200</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.841796875</data>
215
+ <data key="e_suspicion_score">0.841796875</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
223
+ </edge>
224
+ <edge id="e5" source="55484ad3-3cab-11ef-80b1-bb7858a9471f" target="HOST-17254">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1720389200</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.841796875</data>
229
+ <data key="e_suspicion_score">0.841796875</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
237
+ </edge>
238
+ <edge id="e6" source="HOST-17254" target="55484ad3-3cab-11ef-80b1-bb7858a9471f">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1720389200</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.841796875</data>
243
+ <data key="e_suspicion_score">0.841796875</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
251
+ </edge>
252
+ <edge id="e7" source="0a367a10-2ce5-11ef-83f4-872fb6b11cce" target="HOST-17254">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1720389200</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.841796875</data>
257
+ <data key="e_suspicion_score">0.841796875</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
265
+ </edge>
266
+ <edge id="e8" source="HOST-17254" target="0a367a10-2ce5-11ef-83f4-872fb6b11cce">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1720389200</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.841796875</data>
271
+ <data key="e_suspicion_score">0.841796875</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
279
+ </edge>
280
+ <edge id="e9" source="31f127b1-2a21-11ef-a694-9d4c9ac3bf97" target="HOST-17160">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1720389200</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.841796875</data>
285
+ <data key="e_suspicion_score">0.841796875</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
293
+ </edge>
294
+ <edge id="e10" source="HOST-17160" target="31f127b1-2a21-11ef-a694-9d4c9ac3bf97">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1720389200</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.841796875</data>
299
+ <data key="e_suspicion_score">0.841796875</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
307
+ </edge>
308
+ <edge id="e11" source="3c426ee3-28f5-11ef-b508-d5f28f979331" target="HOST-17160">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1720389200</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.841796875</data>
313
+ <data key="e_suspicion_score">0.841796875</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
321
+ </edge>
322
+ <edge id="e12" source="HOST-17160" target="3c426ee3-28f5-11ef-b508-d5f28f979331">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1720389200</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.841796875</data>
327
+ <data key="e_suspicion_score">0.841796875</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
335
+ </edge>
336
+ <edge id="e13" source="6a6bdfd2-36c0-11ef-93b9-391d3da4dc4b" target="HOST-17254">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1720389200</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.841796875</data>
341
+ <data key="e_suspicion_score">0.841796875</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
349
+ </edge>
350
+ <edge id="e14" source="HOST-17254" target="6a6bdfd2-36c0-11ef-93b9-391d3da4dc4b">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1720389200</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.841796875</data>
355
+ <data key="e_suspicion_score">0.841796875</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
363
+ </edge>
364
+ <edge id="e15" source="91df54e6-2980-11ef-9dee-030b9613d80b" target="HOST-17160">
365
+ <data key="e_type">INCIDENT_LINK</data>
366
+ <data key="e_timestamp">1720389200</data>
367
+ <data key="e_label_binary">malicious</data>
368
+ <data key="e_label_confidence">0.841796875</data>
369
+ <data key="e_suspicion_score">0.841796875</data>
370
+ <data key="e_mo_name">Data Theft</data>
371
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
372
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
373
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
374
+ <data key="e_lifecycle_stage">complete-mission</data>
375
+ <data key="e_disposition">Disrupted</data>
376
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
377
+ </edge>
378
+ <edge id="e16" source="HOST-17160" target="91df54e6-2980-11ef-9dee-030b9613d80b">
379
+ <data key="e_type">INCIDENT_LINK</data>
380
+ <data key="e_timestamp">1720389200</data>
381
+ <data key="e_label_binary">malicious</data>
382
+ <data key="e_label_confidence">0.841796875</data>
383
+ <data key="e_suspicion_score">0.841796875</data>
384
+ <data key="e_mo_name">Data Theft</data>
385
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
386
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
387
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
388
+ <data key="e_lifecycle_stage">complete-mission</data>
389
+ <data key="e_disposition">Disrupted</data>
390
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
391
+ </edge>
392
+ <edge id="e17" source="3d38a005-2948-11ef-8b8a-d56510f33f2d" target="HOST-17160">
393
+ <data key="e_type">INCIDENT_LINK</data>
394
+ <data key="e_timestamp">1720389200</data>
395
+ <data key="e_label_binary">malicious</data>
396
+ <data key="e_label_confidence">0.841796875</data>
397
+ <data key="e_suspicion_score">0.841796875</data>
398
+ <data key="e_mo_name">Data Theft</data>
399
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
400
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
401
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
402
+ <data key="e_lifecycle_stage">complete-mission</data>
403
+ <data key="e_disposition">Disrupted</data>
404
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
405
+ </edge>
406
+ <edge id="e18" source="HOST-17160" target="3d38a005-2948-11ef-8b8a-d56510f33f2d">
407
+ <data key="e_type">INCIDENT_LINK</data>
408
+ <data key="e_timestamp">1720389200</data>
409
+ <data key="e_label_binary">malicious</data>
410
+ <data key="e_label_confidence">0.841796875</data>
411
+ <data key="e_suspicion_score">0.841796875</data>
412
+ <data key="e_mo_name">Data Theft</data>
413
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
414
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
415
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
416
+ <data key="e_lifecycle_stage">complete-mission</data>
417
+ <data key="e_disposition">Disrupted</data>
418
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
419
+ </edge>
420
+ <edge id="e19" source="HOST-17021" target="506766a8-28ff-11ef-9756-cd5dc44cf1c0">
421
+ <data key="e_type">INCIDENT_LINK</data>
422
+ <data key="e_timestamp">1720389200</data>
423
+ <data key="e_label_binary">malicious</data>
424
+ <data key="e_label_confidence">0.841796875</data>
425
+ <data key="e_suspicion_score">0.841796875</data>
426
+ <data key="e_mo_name">Data Theft</data>
427
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
428
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
429
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
430
+ <data key="e_lifecycle_stage">complete-mission</data>
431
+ <data key="e_disposition">Disrupted</data>
432
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
433
+ </edge>
434
+ <edge id="e20" source="506766a8-28ff-11ef-9756-cd5dc44cf1c0" target="HOST-17021">
435
+ <data key="e_type">INCIDENT_LINK</data>
436
+ <data key="e_timestamp">1720389200</data>
437
+ <data key="e_label_binary">malicious</data>
438
+ <data key="e_label_confidence">0.841796875</data>
439
+ <data key="e_suspicion_score">0.841796875</data>
440
+ <data key="e_mo_name">Data Theft</data>
441
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
442
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
443
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
444
+ <data key="e_lifecycle_stage">complete-mission</data>
445
+ <data key="e_disposition">Disrupted</data>
446
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
447
+ </edge>
448
+ <edge id="e21" source="be0e72a4-2938-11ef-ab17-b3fec31a5042" target="HOST-17021">
449
+ <data key="e_type">INCIDENT_LINK</data>
450
+ <data key="e_timestamp">1720389200</data>
451
+ <data key="e_label_binary">malicious</data>
452
+ <data key="e_label_confidence">0.841796875</data>
453
+ <data key="e_suspicion_score">0.841796875</data>
454
+ <data key="e_mo_name">Data Theft</data>
455
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
456
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
457
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
458
+ <data key="e_lifecycle_stage">complete-mission</data>
459
+ <data key="e_disposition">Disrupted</data>
460
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
461
+ </edge>
462
+ <edge id="e22" source="HOST-17021" target="be0e72a4-2938-11ef-ab17-b3fec31a5042">
463
+ <data key="e_type">INCIDENT_LINK</data>
464
+ <data key="e_timestamp">1720389200</data>
465
+ <data key="e_label_binary">malicious</data>
466
+ <data key="e_label_confidence">0.841796875</data>
467
+ <data key="e_suspicion_score">0.841796875</data>
468
+ <data key="e_mo_name">Data Theft</data>
469
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
470
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
471
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
472
+ <data key="e_lifecycle_stage">complete-mission</data>
473
+ <data key="e_disposition">Disrupted</data>
474
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
475
+ </edge>
476
+ <edge id="e23" source="HOST-17021" target="de2923d2-32cc-11ef-9fe9-697860fae7ca">
477
+ <data key="e_type">INCIDENT_LINK</data>
478
+ <data key="e_timestamp">1720389200</data>
479
+ <data key="e_label_binary">malicious</data>
480
+ <data key="e_label_confidence">0.841796875</data>
481
+ <data key="e_suspicion_score">0.841796875</data>
482
+ <data key="e_mo_name">Data Theft</data>
483
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
484
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
485
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
486
+ <data key="e_lifecycle_stage">complete-mission</data>
487
+ <data key="e_disposition">Disrupted</data>
488
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
489
+ </edge>
490
+ <edge id="e24" source="de2923d2-32cc-11ef-9fe9-697860fae7ca" target="HOST-17021">
491
+ <data key="e_type">INCIDENT_LINK</data>
492
+ <data key="e_timestamp">1720389200</data>
493
+ <data key="e_label_binary">malicious</data>
494
+ <data key="e_label_confidence">0.841796875</data>
495
+ <data key="e_suspicion_score">0.841796875</data>
496
+ <data key="e_mo_name">Data Theft</data>
497
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
498
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
499
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
500
+ <data key="e_lifecycle_stage">complete-mission</data>
501
+ <data key="e_disposition">Disrupted</data>
502
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
503
+ </edge>
504
+ <edge id="e25" source="HOST-17239" target="HOST-17021">
505
+ <data key="e_type">INCIDENT_LINK</data>
506
+ <data key="e_timestamp">1720389200</data>
507
+ <data key="e_label_binary">malicious</data>
508
+ <data key="e_label_confidence">0.841796875</data>
509
+ <data key="e_suspicion_score">0.841796875</data>
510
+ <data key="e_mo_name">Data Theft</data>
511
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
512
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
513
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
514
+ <data key="e_lifecycle_stage">complete-mission</data>
515
+ <data key="e_disposition">Disrupted</data>
516
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
517
+ </edge>
518
+ <edge id="e26" source="HOST-17021" target="HOST-17239">
519
+ <data key="e_type">INCIDENT_LINK</data>
520
+ <data key="e_timestamp">1720389200</data>
521
+ <data key="e_label_binary">malicious</data>
522
+ <data key="e_label_confidence">0.841796875</data>
523
+ <data key="e_suspicion_score">0.841796875</data>
524
+ <data key="e_mo_name">Data Theft</data>
525
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
526
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
527
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
528
+ <data key="e_lifecycle_stage">complete-mission</data>
529
+ <data key="e_disposition">Disrupted</data>
530
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
531
+ </edge>
532
+ <edge id="e27" source="91df54e6-2980-11ef-9dee-030b9613d80b" target="HOST-17021">
533
+ <data key="e_type">INCIDENT_LINK</data>
534
+ <data key="e_timestamp">1720389200</data>
535
+ <data key="e_label_binary">malicious</data>
536
+ <data key="e_label_confidence">0.841796875</data>
537
+ <data key="e_suspicion_score">0.841796875</data>
538
+ <data key="e_mo_name">Data Theft</data>
539
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
540
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
541
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
542
+ <data key="e_lifecycle_stage">complete-mission</data>
543
+ <data key="e_disposition">Disrupted</data>
544
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
545
+ </edge>
546
+ <edge id="e28" source="HOST-17021" target="91df54e6-2980-11ef-9dee-030b9613d80b">
547
+ <data key="e_type">INCIDENT_LINK</data>
548
+ <data key="e_timestamp">1720389200</data>
549
+ <data key="e_label_binary">malicious</data>
550
+ <data key="e_label_confidence">0.841796875</data>
551
+ <data key="e_suspicion_score">0.841796875</data>
552
+ <data key="e_mo_name">Data Theft</data>
553
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
554
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
555
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
556
+ <data key="e_lifecycle_stage">complete-mission</data>
557
+ <data key="e_disposition">Disrupted</data>
558
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
559
+ </edge>
560
+ <edge id="e29" source="7b4ea4e8-2d06-11ef-a924-bf8e7742a8e0" target="HOST-17021">
561
+ <data key="e_type">INCIDENT_LINK</data>
562
+ <data key="e_timestamp">1720389200</data>
563
+ <data key="e_label_binary">malicious</data>
564
+ <data key="e_label_confidence">0.841796875</data>
565
+ <data key="e_suspicion_score">0.841796875</data>
566
+ <data key="e_mo_name">Data Theft</data>
567
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
568
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
569
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
570
+ <data key="e_lifecycle_stage">complete-mission</data>
571
+ <data key="e_disposition">Disrupted</data>
572
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
573
+ </edge>
574
+ <edge id="e30" source="HOST-17021" target="7b4ea4e8-2d06-11ef-a924-bf8e7742a8e0">
575
+ <data key="e_type">INCIDENT_LINK</data>
576
+ <data key="e_timestamp">1720389200</data>
577
+ <data key="e_label_binary">malicious</data>
578
+ <data key="e_label_confidence">0.841796875</data>
579
+ <data key="e_suspicion_score">0.841796875</data>
580
+ <data key="e_mo_name">Data Theft</data>
581
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
582
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
583
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
584
+ <data key="e_lifecycle_stage">complete-mission</data>
585
+ <data key="e_disposition">Disrupted</data>
586
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
587
+ </edge>
588
+ <edge id="e31" source="7b4ea4e8-2d06-11ef-a924-bf8e7742a8e0" target="HOST-17254">
589
+ <data key="e_type">INCIDENT_LINK</data>
590
+ <data key="e_timestamp">1720389200</data>
591
+ <data key="e_label_binary">malicious</data>
592
+ <data key="e_label_confidence">0.841796875</data>
593
+ <data key="e_suspicion_score">0.841796875</data>
594
+ <data key="e_mo_name">Data Theft</data>
595
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
596
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
597
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
598
+ <data key="e_lifecycle_stage">complete-mission</data>
599
+ <data key="e_disposition">Disrupted</data>
600
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
601
+ </edge>
602
+ <edge id="e32" source="HOST-17254" target="7b4ea4e8-2d06-11ef-a924-bf8e7742a8e0">
603
+ <data key="e_type">INCIDENT_LINK</data>
604
+ <data key="e_timestamp">1720389200</data>
605
+ <data key="e_label_binary">malicious</data>
606
+ <data key="e_label_confidence">0.841796875</data>
607
+ <data key="e_suspicion_score">0.841796875</data>
608
+ <data key="e_mo_name">Data Theft</data>
609
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
610
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
611
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
612
+ <data key="e_lifecycle_stage">complete-mission</data>
613
+ <data key="e_disposition">Disrupted</data>
614
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
615
+ </edge>
616
+ <edge id="e33" source="50999f90-2912-11ef-9502-4dd424261eba" target="HOST-17254">
617
+ <data key="e_type">INCIDENT_LINK</data>
618
+ <data key="e_timestamp">1720389200</data>
619
+ <data key="e_label_binary">malicious</data>
620
+ <data key="e_label_confidence">0.841796875</data>
621
+ <data key="e_suspicion_score">0.841796875</data>
622
+ <data key="e_mo_name">Data Theft</data>
623
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
624
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
625
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
626
+ <data key="e_lifecycle_stage">complete-mission</data>
627
+ <data key="e_disposition">Disrupted</data>
628
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
629
+ </edge>
630
+ <edge id="e34" source="HOST-17254" target="50999f90-2912-11ef-9502-4dd424261eba">
631
+ <data key="e_type">INCIDENT_LINK</data>
632
+ <data key="e_timestamp">1720389200</data>
633
+ <data key="e_label_binary">malicious</data>
634
+ <data key="e_label_confidence">0.841796875</data>
635
+ <data key="e_suspicion_score">0.841796875</data>
636
+ <data key="e_mo_name">Data Theft</data>
637
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
638
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
639
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
640
+ <data key="e_lifecycle_stage">complete-mission</data>
641
+ <data key="e_disposition">Disrupted</data>
642
+ <data key="e_incident_id">52fd4960-3cab-11ef-ba57-c3c14c21a8c2</data>
643
+ </edge>
644
+ </graph>
645
+ </graphml>
graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c4d0b251-2845-11ee-884f-c9148f4dd481">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.35.41</data>
43
+ <data key="n_hostname">100.64.35.41</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2750" target="c4d0b251-2845-11ee-884f-c9148f4dd481">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694131488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">53325c50-4ddb-11ee-9c4b-a19d1bad2d38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f772d20-3544-11ee-8bfe-87e75716aaa6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.83</data>
35
+ <data key="n_hostname">USER-0015-1218.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4382" target="HOST-2731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694131488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">5340b430-4ddb-11ee-9c4b-a19d1bad2d38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml ADDED
@@ -0,0 +1,293 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1485412a-2904-11ef-bc8c-d3e23b878cde">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.110</data>
35
+ <data key="n_hostname">100.64.4.110</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7055bb61-28f5-11ef-b954-07429fc6e992">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="da2b6d82-2901-11ef-baf7-312880ec7e74">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.90.204</data>
51
+ <data key="n_hostname">100.64.90.204</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="0deb9024-2932-11ef-a57c-b93e8c040a44">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.19.192</data>
59
+ <data key="n_hostname">100.64.19.192</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="9074ac55-2907-11ef-ae84-ed5796808afa">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.63.192</data>
67
+ <data key="n_hostname">100.64.63.192</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.4375</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="ea84e083-37c0-11ef-a69d-2bf8a0374aed">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.42.190</data>
75
+ <data key="n_hostname">100.64.42.190</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="d13625a2-28f5-11ef-bba0-575225f03a0e">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.90.205</data>
83
+ <data key="n_hostname">100.64.90.205</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="9a85f491-3421-11ef-a41f-f10da63ecd96">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.90.206</data>
91
+ <data key="n_hostname">100.64.90.206</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <edge id="e1" source="1485412a-2904-11ef-bc8c-d3e23b878cde" target="HOST-17013">
97
+ <data key="e_type">INCIDENT_LINK</data>
98
+ <data key="e_timestamp">1720389200</data>
99
+ <data key="e_label_binary">malicious</data>
100
+ <data key="e_label_confidence">0.841796875</data>
101
+ <data key="e_suspicion_score">0.841796875</data>
102
+ <data key="e_mo_name">Data Theft</data>
103
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
104
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
105
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
106
+ <data key="e_lifecycle_stage">complete-mission</data>
107
+ <data key="e_disposition">Disrupted</data>
108
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
109
+ </edge>
110
+ <edge id="e2" source="HOST-17013" target="1485412a-2904-11ef-bc8c-d3e23b878cde">
111
+ <data key="e_type">INCIDENT_LINK</data>
112
+ <data key="e_timestamp">1720389200</data>
113
+ <data key="e_label_binary">malicious</data>
114
+ <data key="e_label_confidence">0.841796875</data>
115
+ <data key="e_suspicion_score">0.841796875</data>
116
+ <data key="e_mo_name">Data Theft</data>
117
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
118
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
119
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
120
+ <data key="e_lifecycle_stage">complete-mission</data>
121
+ <data key="e_disposition">Disrupted</data>
122
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
123
+ </edge>
124
+ <edge id="e3" source="da2b6d82-2901-11ef-baf7-312880ec7e74" target="HOST-17013">
125
+ <data key="e_type">INCIDENT_LINK</data>
126
+ <data key="e_timestamp">1720389200</data>
127
+ <data key="e_label_binary">malicious</data>
128
+ <data key="e_label_confidence">0.841796875</data>
129
+ <data key="e_suspicion_score">0.841796875</data>
130
+ <data key="e_mo_name">Data Theft</data>
131
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
132
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
133
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
134
+ <data key="e_lifecycle_stage">complete-mission</data>
135
+ <data key="e_disposition">Disrupted</data>
136
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
137
+ </edge>
138
+ <edge id="e4" source="HOST-17013" target="da2b6d82-2901-11ef-baf7-312880ec7e74">
139
+ <data key="e_type">INCIDENT_LINK</data>
140
+ <data key="e_timestamp">1720389200</data>
141
+ <data key="e_label_binary">malicious</data>
142
+ <data key="e_label_confidence">0.841796875</data>
143
+ <data key="e_suspicion_score">0.841796875</data>
144
+ <data key="e_mo_name">Data Theft</data>
145
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
146
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
147
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
148
+ <data key="e_lifecycle_stage">complete-mission</data>
149
+ <data key="e_disposition">Disrupted</data>
150
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
151
+ </edge>
152
+ <edge id="e5" source="0deb9024-2932-11ef-a57c-b93e8c040a44" target="HOST-17013">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1720389200</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.841796875</data>
157
+ <data key="e_suspicion_score">0.841796875</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
165
+ </edge>
166
+ <edge id="e6" source="HOST-17013" target="0deb9024-2932-11ef-a57c-b93e8c040a44">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1720389200</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.841796875</data>
171
+ <data key="e_suspicion_score">0.841796875</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
179
+ </edge>
180
+ <edge id="e7" source="9074ac55-2907-11ef-ae84-ed5796808afa" target="HOST-17013">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1720389200</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.841796875</data>
185
+ <data key="e_suspicion_score">0.841796875</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
193
+ </edge>
194
+ <edge id="e8" source="HOST-17013" target="9074ac55-2907-11ef-ae84-ed5796808afa">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1720389200</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.841796875</data>
199
+ <data key="e_suspicion_score">0.841796875</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
207
+ </edge>
208
+ <edge id="e9" source="ea84e083-37c0-11ef-a69d-2bf8a0374aed" target="HOST-17013">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1720389200</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.841796875</data>
213
+ <data key="e_suspicion_score">0.841796875</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
221
+ </edge>
222
+ <edge id="e10" source="HOST-17013" target="ea84e083-37c0-11ef-a69d-2bf8a0374aed">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1720389200</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.841796875</data>
227
+ <data key="e_suspicion_score">0.841796875</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
235
+ </edge>
236
+ <edge id="e11" source="d13625a2-28f5-11ef-bba0-575225f03a0e" target="HOST-17013">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1720389200</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.841796875</data>
241
+ <data key="e_suspicion_score">0.841796875</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
249
+ </edge>
250
+ <edge id="e12" source="HOST-17013" target="d13625a2-28f5-11ef-bba0-575225f03a0e">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1720389200</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.841796875</data>
255
+ <data key="e_suspicion_score">0.841796875</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
263
+ </edge>
264
+ <edge id="e13" source="9a85f491-3421-11ef-a41f-f10da63ecd96" target="HOST-17013">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1720389200</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.841796875</data>
269
+ <data key="e_suspicion_score">0.841796875</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
277
+ </edge>
278
+ <edge id="e14" source="HOST-17013" target="9a85f491-3421-11ef-a41f-f10da63ecd96">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1720389200</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.841796875</data>
283
+ <data key="e_suspicion_score">0.841796875</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">53494680-3cab-11ef-ba57-c3c14c21a8c2</data>
291
+ </edge>
292
+ </graph>
293
+ </graphml>
graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,135 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="863b5b00-fa4f-11ec-8b27-3383c75c71b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.77.104</data>
35
+ <data key="n_hostname">100.64.77.104</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="ef6bf530-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.77</data>
43
+ <data key="n_hostname">100.64.72.77</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="7befe2b3-08cd-11ed-8d0c-a922f55dd0a0">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.56</data>
51
+ <data key="n_hostname">100.64.76.56</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="b0ceeca4-1bf2-11ed-9108-69d970162826">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.1.28</data>
59
+ <data key="n_hostname">100.64.1.28</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-14485" target="HOST-12865">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1660796099</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">534bacf0-1eac-11ed-b576-2ddb0d65fe5a</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-12865" target="HOST-14485">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1660796099</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">534bacf0-1eac-11ed-b576-2ddb0d65fe5a</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-14036" target="HOST-12865">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1660796099</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">534bacf0-1eac-11ed-b576-2ddb0d65fe5a</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-12865" target="HOST-14036">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1660796099</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.7</data>
111
+ <data key="e_suspicion_score">0.25</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Unprocessed</data>
118
+ <data key="e_incident_id">534bacf0-1eac-11ed-b576-2ddb0d65fe5a</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-14485" target="b0ceeca4-1bf2-11ed-9108-69d970162826">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1660796099</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7</data>
125
+ <data key="e_suspicion_score">0.25</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Unprocessed</data>
132
+ <data key="e_incident_id">534bacf0-1eac-11ed-b576-2ddb0d65fe5a</data>
133
+ </edge>
134
+ </graph>
135
+ </graphml>
graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f772d20-3544-11ee-8bfe-87e75716aaa6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.83</data>
43
+ <data key="n_hostname">USER-0015-1218.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.9634375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-4382">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694131488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9634375</data>
53
+ <data key="e_suspicion_score">0.9634375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="6d6c52b4-0d4a-11ed-8072-c18911da47a2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.84</data>
43
+ <data key="n_hostname">100.64.76.84</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="6d6c52b4-0d4a-11ed-8072-c18911da47a2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660796099</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">53565b50-1eac-11ed-b576-2ddb0d65fe5a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="189cf079-3268-11ee-9548-63fc2f248127">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.241</data>
35
+ <data key="n_hostname">100.64.69.241</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="be6bda84-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.22</data>
43
+ <data key="n_hostname">100.64.68.22</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="189cf079-3268-11ee-9548-63fc2f248127" target="HOST-11392">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692537196</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">535ad6a0-3f5b-11ee-a7a8-a9c952ce7042</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11392" target="189cf079-3268-11ee-9548-63fc2f248127">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1692537196</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.6625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">535ad6a0-3f5b-11ee-a7a8-a9c952ce7042</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>