diff --git a/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdacf51ca258ddc659e8c7bc88c215f54b0202f6
--- /dev/null
+++ b/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.38
+ 100.64.37.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52123240-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..842a90d6c5bda9073441c5862ff6e0fe23260462
--- /dev/null
+++ b/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.170
+ 100.64.91.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5212cd80-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7167a26636214ead79b0312f5cbbe1e551419f2a
--- /dev/null
+++ b/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.21
+ 100.64.62.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 521475d0-6a4e-11ee-a1cb-53f21743b64f
+
+
+ INCIDENT_LINK
+ 1697259511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 521475d0-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c36ed4ed9cd46eb32f6c2a8079af1537c97dd16d
--- /dev/null
+++ b/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.54
+ 100.64.75.54
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.228
+ 100.64.82.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687776223
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 521e9e20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776223
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 521e9e20-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..173539babc53b5347ae144a9e4609b3836efe859
--- /dev/null
+++ b/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.51
+ 100.64.47.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101491
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 521eb840-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..632dc3dda93a9138e3a4fc53f82e6049643556cf
--- /dev/null
+++ b/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.170
+ 100.64.91.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 522236d0-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb2cd50327fd3c77072bb08d89f8cf40f8605548
--- /dev/null
+++ b/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.36
+ 100.64.37.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 522bfbd0-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a299c78bffb69d23361e4a8b0c5574fc9ae0fbf9
--- /dev/null
+++ b/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1689357630
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 522df850-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2f24f9332a3f0a0d66e2763a56341094c3ad78f
--- /dev/null
+++ b/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.173
+ 100.64.91.173
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 522fa450-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58c13f877aafd09e7a251679405d232ceac6e7b8
--- /dev/null
+++ b/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.192
+ 100.64.94.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 523110f0-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17783227d44a125697c4564a53668bb8a6aa4109
--- /dev/null
+++ b/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.40
+ 100.64.1.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.48.19
+ 100.64.48.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776223
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 52331080-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776223
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 52331080-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b4dc724a0a19ac1ea3eaf331fe773704c13a7c9
--- /dev/null
+++ b/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.242
+ 100.64.87.242
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.163
+ 100.64.94.163
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714983553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5234e660-0b81-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5234e660-0b81-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5234e660-0b81-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5234e660-0b81-11ef-b87c-0d8b17cd9fbf
+
+
+
diff --git a/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d22956627d7c3e2cf44b18dbfd1572c17f3baeb5
--- /dev/null
+++ b/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.173
+ 100.64.91.173
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 523e9870-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbcb9b5c08d56e035ed8b63c066d306d01f2272e
--- /dev/null
+++ b/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689357630
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52483710-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed14e74ef50b06734e1d9206b801716c2e3b90bb
--- /dev/null
+++ b/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.190
+ 100.64.20.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424736
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52545530-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6026b65119e5db7ea99ff9e1750c15759221aa98
--- /dev/null
+++ b/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1714073879
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52585850-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9fbc31bc05a181f89ecfded61a106fad1f7cc67
--- /dev/null
+++ b/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.151
+ 100.64.80.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660796098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5260fed0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f4d527e24d622bc4571a0b0b5ebcd4e46857830
--- /dev/null
+++ b/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.190
+ 100.64.20.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5263be80-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..605d526e957329a355ab77148e37b4b121e8b163
--- /dev/null
+++ b/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.199
+ USER-0015-1270.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473560
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5264a300-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4555b9f8b4d105062efb83a9cdd05c81fc07b72b
--- /dev/null
+++ b/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.151
+ 100.64.80.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660796098
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5268ee10-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccd57102ec26de5b8255aebf08034e620b424c20
--- /dev/null
+++ b/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.175
+ 100.64.91.175
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 526f6c70-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a50f49dc7466b58fd64c83765fcd82dc8198c37c
--- /dev/null
+++ b/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.206
+ 100.64.14.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443973
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5273e610-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26c93000863d9777983a09bc8cdc101da63c4d93
--- /dev/null
+++ b/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.199
+ USER-0015-1270.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473560
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 528179d0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2b18045fdf2829edb203ef1709c4c4669244a76
--- /dev/null
+++ b/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.206
+ 100.64.14.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443974
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5284aef0-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0d5c5e40425578223b6dd6ae0d9f2461311d7ec
--- /dev/null
+++ b/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.149
+ 100.64.47.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 528d02a0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ff4dab58eb4235fde0d26573eb6af1a2921d926
--- /dev/null
+++ b/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.38
+ 100.64.65.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528120
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 528ef210-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03892a6b49f9879c765493a5ef3c660225cad482
--- /dev/null
+++ b/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.39
+ 100.64.15.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52943f50-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0fee60a2dbb96514152684013ed343e82268119
--- /dev/null
+++ b/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.38
+ 100.64.65.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52a0f370-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e72db79bb3e49df28aca0de8252637f4ae84489
--- /dev/null
+++ b/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.155
+ 100.64.80.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660796098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52a35f00-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..747cf654468b677652bc83c873c984ff75144dc7
--- /dev/null
+++ b/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.238
+ 100.64.52.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52aac3d0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83b658e55ba03a6b7675f64071b0a4c71ecf598e
--- /dev/null
+++ b/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.62.242
+ USER-0015-1521.example.internal
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.125
+ 100.64.69.125
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214179
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52aae440-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d72cd2fb67d2a4251aab0dfa25f904292e6eee57
--- /dev/null
+++ b/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.38
+ 100.64.11.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101492
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52adb1d0-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0aca5bce8e35f4b59776f1460843622bb667c2eb
--- /dev/null
+++ b/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.201
+ 100.64.76.201
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.51.2
+ 100.64.51.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661506056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52ade530-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52ade530-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e4a707747b2f0ba581f14594bfaf78eba9a226a
--- /dev/null
+++ b/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.155
+ 100.64.80.155
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660796098
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52ae0d60-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb6c0b16b7007e6d7df90753363b90e43559235d
--- /dev/null
+++ b/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.56
+ 100.64.83.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677919704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52b68860-ba69-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..caa8bb2e2b7f07cc66d63ca71edd1afe85b0b39d
--- /dev/null
+++ b/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.38
+ 100.64.11.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101492
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 52be0580-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47849d36da1cdfdfc94816f5388d6655bd659ac1
--- /dev/null
+++ b/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.238
+ 100.64.52.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 52c43f40-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31a9dc54b3d3cc553720e6ca026b898028f13697
--- /dev/null
+++ b/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.55
+ 100.64.47.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101492
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 52cad6c0-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b61d4a82ea5d7e7b41173ae390fbcfad482384f
--- /dev/null
+++ b/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.177
+ 100.64.81.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659285988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52d85c60-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659285988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52d85c60-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4344ad5ececa10244a66fc41d68007225f9f4937
--- /dev/null
+++ b/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.55
+ 100.64.47.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101492
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52d8e080-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..096b76f4cef950d5d13cb1f7e6787ec8c7093d8d
--- /dev/null
+++ b/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.157
+ 100.64.80.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.158
+ 100.64.80.158
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e238853954fdb29ef23f9943faef92ba36b155af
--- /dev/null
+++ b/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.129
+ 100.64.37.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101492
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52e822c0-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cfb8effdd54789e99786b3f5ab7af4e5c8aa4ce
--- /dev/null
+++ b/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,645 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.43
+ 100.64.38.43
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.192
+ USER-0015-2050.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.193
+ 100.64.90.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.194
+ 100.64.90.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.195
+ 100.64.90.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.196
+ USER-0015-2051.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.55
+ 100.64.5.55
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.12.90
+ 100.64.12.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.178
+ 100.64.86.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.197
+ USER-0015-2052.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.106
+ 100.64.28.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 52fd4960-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7edf4bb42713da4772ded59b642db229f1af01a
--- /dev/null
+++ b/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.41
+ 100.64.35.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53325c50-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a359e4fb477c9c698a633fa81208fd5bb0c1dbdb
--- /dev/null
+++ b/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5340b430-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b448e70a91aeb8e727c0f3d53df7f70ee90531ad
--- /dev/null
+++ b/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.110
+ 100.64.4.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.204
+ 100.64.90.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.192
+ 100.64.19.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.192
+ 100.64.63.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.190
+ 100.64.42.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.205
+ 100.64.90.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.206
+ 100.64.90.206
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389200
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53494680-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b2f852aa099e7c611ddc2c829fffc330ce521c5
--- /dev/null
+++ b/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.104
+ 100.64.77.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.56
+ 100.64.76.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 534bacf0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 534bacf0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 534bacf0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 534bacf0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 534bacf0-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c301f475ec3ff301da5055719d71767f9d6962d
--- /dev/null
+++ b/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131488
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d6aa600cd9deba3ffeb690d652cafbc3a308721
--- /dev/null
+++ b/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.84
+ 100.64.76.84
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660796099
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53565b50-1eac-11ed-b576-2ddb0d65fe5a
+
+
+
diff --git a/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50957ea319113f9d4f17930cf9e83a75587d26f4
--- /dev/null
+++ b/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.241
+ 100.64.69.241
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692537196
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 535ad6a0-3f5b-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537196
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 535ad6a0-3f5b-11ee-a7a8-a9c952ce7042
+
+
+
diff --git a/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8edbb13678a475a4c10bed540a81b7d108d6c95
--- /dev/null
+++ b/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661350580
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5364dda0-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..982029668715a7b4b7162898c96f3e31bd054ab6
--- /dev/null
+++ b/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.175
+ 100.64.16.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702958935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 536986a0-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 536986a0-9e24-11ee-9ce0-3dd61bd6a247
+
+
+
diff --git a/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64d6702acc267a973d263b4717a7a8f08737ba51
--- /dev/null
+++ b/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661350580
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 536b4640-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62cd0456e610b35dd83f6302d25f5b4779d10ceb
--- /dev/null
+++ b/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.181
+ 100.64.85.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661350580
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 536f16d0-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..097b514b315f996376f691447d1284fdd4428bf0
--- /dev/null
+++ b/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.85.181
+ 100.64.85.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661350580
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53741fe0-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac051cfa93f71bc8c33da08baec207d3b716b11e
--- /dev/null
+++ b/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.81
+ 100.64.10.81
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099318
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 537c5af0-df15-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2b7e4ff3c554dbcbeabac17acdae2a9351d3c23
--- /dev/null
+++ b/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.238
+ 100.64.52.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 537c92c0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84d7f68ba690050003fee9a9aab431e24bde1d41
--- /dev/null
+++ b/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.200
+ 100.64.71.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 537de250-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..622b0a474b3be2978dcd39e043117d93c42e749d
--- /dev/null
+++ b/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.62
+ 100.64.21.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693912875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5388ef10-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f5b2ca7006ef3a67215b52a0b344dd1ad359dd2
--- /dev/null
+++ b/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.81
+ 100.64.10.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099318
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 538e5c50-df15-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..070733d512890febbc72437db27196d1ebd36e73
--- /dev/null
+++ b/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.200
+ 100.64.71.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272128
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 538ed240-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef003247ffe037c6c186019c8d446212c443efad
--- /dev/null
+++ b/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.188
+ 100.64.79.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.79.189
+ 100.64.79.189
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1678376690
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53962e80-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376690
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53962e80-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376690
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53962e80-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376690
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53962e80-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d388c1b40a6890b38e115b365c5f86213e4ecae
--- /dev/null
+++ b/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.95
+ 100.64.60.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 53999450-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de8aa04aa69c899f58a701b12367fffb567a8360
--- /dev/null
+++ b/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.21.62
+ 100.64.21.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693912875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 539c28f0-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12facc042e96af454eccd3281fec9186a1de055f
--- /dev/null
+++ b/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.20
+ 100.64.49.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701570372
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 539d5ff0-9183-11ee-afab-0bead911b18a
+
+
+
diff --git a/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a51fa3ca1e54a457aedb2c8d15fa288654a6c2cf
--- /dev/null
+++ b/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.247.211
+ 192.168.247.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.77.41
+ 100.64.77.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689002009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 539fb500-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 539fb500-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1879644b1f6196e5b3f9baea026253b586dd3e3c
--- /dev/null
+++ b/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.14
+ 100.64.83.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657013952
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53a6bfb0-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013952
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53a6bfb0-fc46-11ec-b1da-11e6c916d75e
+
+
+
diff --git a/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4fbc9c040aaa577b29ede990b2ca16807e022ee
--- /dev/null
+++ b/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.105
+ 100.64.58.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53a7dcc0-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53a7dcc0-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e16ac314704e8c4b1f524112baa0ad3fcc8930dd
--- /dev/null
+++ b/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.43
+ 100.64.97.43
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1691917863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53af1460-39b9-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39318d3f929c03165e6581c0c55abd1c94c3a902
--- /dev/null
+++ b/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.44.135
+ 100.64.44.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684823865
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53b09350-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fd7067441c937003643f82e41e0b60609bb5e03
--- /dev/null
+++ b/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.200
+ 100.64.77.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53b63060-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cc51ef135523e15f2f4c23828c80c27128480f8
--- /dev/null
+++ b/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.114
+ 100.64.16.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53b70e50-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53b70e50-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c06b1add489fe31bc21e2ed790a5e565d645cc9a
--- /dev/null
+++ b/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.143
+ 100.64.58.143
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53b95d90-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7716f08d596a2dea8c3db463ad01c55fcd7d315c
--- /dev/null
+++ b/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.200
+ 100.64.77.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272128
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53cd88f0-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ba6134620a59455b36fabe9be97a48ffadefc7b
--- /dev/null
+++ b/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.105
+ 100.64.58.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53d380a0-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee37306a316ab0c846af428faeb4117d3d1be1dd
--- /dev/null
+++ b/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.43
+ 100.64.97.43
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691917863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53d38c50-39b9-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f9a203ee48164e171eba4e1ab06ca15c5df875d
--- /dev/null
+++ b/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.143
+ 100.64.58.143
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473562
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53d80920-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39135ce9507bee28fa9b96f0bdee8e05b15855e0
--- /dev/null
+++ b/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.15
+ 100.64.79.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.86
+ 100.64.73.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.109
+ USER-0015-1627.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208944
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53df5290-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c064c1f0c16983ae8ebde6c7f5e6c5c573ae7e29
--- /dev/null
+++ b/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.132
+ 100.64.73.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53e3a900-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ca0477b0cdc2616e630af189150f19c69fb3155
--- /dev/null
+++ b/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.57
+ 100.64.47.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101494
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53e3e7e0-8427-11ee-aad5-255bef0b512c
+
+
+ INCIDENT_LINK
+ 1700101494
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53e3e7e0-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5327e13b36cd75e416a7531ef398f13d0a36de25
--- /dev/null
+++ b/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.153
+ 100.64.73.153
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53eb4b60-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..414803330f72e400b17a2ac79108a01a97cd66b6
--- /dev/null
+++ b/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.208
+ 100.64.3.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321625
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53f08710-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a6c72be69c8bb7fc66d489bf8511ba983e2b39c
--- /dev/null
+++ b/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.57
+ 100.64.47.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101494
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 53f35130-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df0368d8d0853e34d8caeed52ef4f93dc93cdb41
--- /dev/null
+++ b/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.186
+ 100.64.92.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693912875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 53f80490-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5934533c0d238c942ed7cecd38f76728e6481cbd
--- /dev/null
+++ b/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.153
+ 100.64.73.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 53fb7800-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecab62b179e03e2afbf29f0d87f53c2fd72d4f20
--- /dev/null
+++ b/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.136
+ 100.64.91.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689357633
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 53fd6120-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..027458da48cfc685ce689cf422d9202a1d226262
--- /dev/null
+++ b/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.118
+ 100.64.22.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53fe5880-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d530018e63c9b05439015e05e688ee47ce4dc9ca
--- /dev/null
+++ b/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.208
+ 100.64.3.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321625
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 53feb7e0-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0445e1932495c4e44384b1f82341ab5c99870de7
--- /dev/null
+++ b/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.59
+ 100.64.47.59
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101494
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 53ffd450-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..736e89e06d37b8585351a88c851b6ed87f718df1
--- /dev/null
+++ b/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.145
+ 100.64.58.145
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5400c6d0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddea684b2ecb8f77e22eacf88c787532783467c1
--- /dev/null
+++ b/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.132
+ 100.64.73.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54053ac0-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9778e82881a68a018ebb5a9c82621336239d7fbc
--- /dev/null
+++ b/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.247
+ 100.64.75.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 540a4510-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d92d245db0a05855191af7229898ff991120bbb5
--- /dev/null
+++ b/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.59
+ 100.64.47.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700101494
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 540e5340-8427-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a151f1d30f240236984029de1deb4fe2f48c7e67
--- /dev/null
+++ b/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.137
+ 100.64.44.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684823866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 540eb8e0-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2438cecd1b898da8365da877bddb9d3126d81795
--- /dev/null
+++ b/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.118
+ 100.64.22.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871325
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 540f6f80-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9521f27f0b9da89c2e245921c454e108608ce517
--- /dev/null
+++ b/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.161.240.76
+ USER-0015-1582.example.internal
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Vulnerability Management","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.99
+ 100.64.70.99
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.100
+ USER-0015-1583.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.101
+ USER-0015-1584.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.102
+ USER-0015-1585.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.103
+ 100.64.70.103
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.104
+ 100.64.70.104
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.105
+ 100.64.70.105
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073882
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54108fa0-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7504fd3fb2e9dda8506bf9b87b7faf248b01018
--- /dev/null
+++ b/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.35
+ 100.64.71.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54193930-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e82a5d282b31c45b9ef62ac490d2fb20c438d2bd
--- /dev/null
+++ b/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.163
+ 100.64.7.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 541c2300-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b1c0318da6661545e4c2f66f6ccdd89156b55fd
--- /dev/null
+++ b/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.74
+ 100.64.76.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 541f5270-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3990df41a0f227c3a14d831a3fa86201d576d093
--- /dev/null
+++ b/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.145
+ 100.64.58.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473563
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54293660-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..193e0f2249211bfbd73449f10704bba6191227fa
--- /dev/null
+++ b/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.104
+ 100.64.30.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699478
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54296670-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699478
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54296670-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699478
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54296670-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699478
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54296670-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ce3721a3be48bbdcd30683929a2c62e9503737e
--- /dev/null
+++ b/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.44.137
+ 100.64.44.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684823866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 542a5730-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a578e717540aaed689809a6dcc510a43135740f
--- /dev/null
+++ b/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.35
+ 100.64.71.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 542bd6d0-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d73b27d52804c0adac1e64d9393944ec9a4790ca
--- /dev/null
+++ b/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.136
+ 100.64.91.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689357634
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5432a1f0-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70a24ce13b7f515f5d505999f6831d2006ce5861
--- /dev/null
+++ b/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.163
+ 100.64.7.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416869
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5432b840-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92c43f7b08be9b00bed99787b6491765e9f02934
--- /dev/null
+++ b/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.39
+ 100.64.17.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052705
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5434e9f0-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6d6e15d10251be0b0cf29a0c2235a09cc6aba2b
--- /dev/null
+++ b/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.74
+ 100.64.76.74
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5439b840-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04c3465ed7117ae9d562a0b03b2dc2c8a0c7c149
--- /dev/null
+++ b/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.249
+ 100.64.75.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 543bb550-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5fc992f7927e8ed68b066a629cf82c2ea7ebd073
--- /dev/null
+++ b/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.13.93
+ 100.64.13.93
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595644
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595644
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595644
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595644
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3886da40550f29759b613671ec6df7d81e26ec87
--- /dev/null
+++ b/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.235
+ 100.64.23.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54437500-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f3d069edee6d371e3a37c01ef079a3f5860737b
--- /dev/null
+++ b/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54472150-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa2f6207ea6af7adbe341c5badccc57d339dd4b9
--- /dev/null
+++ b/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.192
+ 100.64.20.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54480ee0-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69f6ec808b459d7887c37272f1a6a5d41f780de6
--- /dev/null
+++ b/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54507490-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04727ad9cab9adf0947d75f9c45f2259234892b5
--- /dev/null
+++ b/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018144
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 545307c0-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0063b3afc473940342e91beb94a8cc3c4773c54e
--- /dev/null
+++ b/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.249
+ 100.64.75.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 545afd20-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fbb0d473eed484f6f30f51f0f3d020d6d47cc8a
--- /dev/null
+++ b/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871326
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 545fd970-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6830c3ea4a5f92e27347aafcc618e215293ef801
--- /dev/null
+++ b/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.192
+ 100.64.20.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54613c30-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1760887e326582067c4f22d906e006cc2a5552e
--- /dev/null
+++ b/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018145
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5467c840-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7b38487cb83d494550b9ecbf29c942addb58319
--- /dev/null
+++ b/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.150
+ 100.64.79.150
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.37
+ 100.64.29.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686591675
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 546b5680-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591675
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 546b5680-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591675
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 546b5680-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591675
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 546b5680-0948-11ee-899e-3d5be197ab3b
+
+
+
diff --git a/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4456da0d7ba39ef0c12e95cb5fadd96240fbec1e
--- /dev/null
+++ b/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.119
+ 100.64.59.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871326
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 546e3150-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a595b68229d785accfd985585961117d70965a1
--- /dev/null
+++ b/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686272129
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5474c570-0660-11ee-8e53-6f51e8fa7a6b
+
+
+
diff --git a/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69532a763b5a4415093c17b0973b01a77b1e5e66
--- /dev/null
+++ b/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.194
+ 100.64.20.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 547894c0-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b1a032b3fdd3ff1a6eeeadb091a129240dc2025
--- /dev/null
+++ b/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.174
+ 100.64.80.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5478bc50-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5478bc50-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00a1d046b8872145397643259f87c78337709f35
--- /dev/null
+++ b/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.175
+ 100.64.80.175
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.12
+ 100.64.77.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 548195f0-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 548195f0-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..134813fd604b009652b9f1b5fd73ca322ad8910b
--- /dev/null
+++ b/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.194
+ 100.64.20.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424740
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54887340-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbf6bd8269cfacaa34b5d3f957acdbf90b748576
--- /dev/null
+++ b/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.251
+ 100.64.75.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 548a4a80-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..484ea9570a16fffbc32fc32243db4611aff14944
--- /dev/null
+++ b/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.227
+ 100.64.93.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693912876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 548ec650-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..793206a5aee333784b14df12ff14d04206fb97ee
--- /dev/null
+++ b/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.92
+ 100.64.57.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.199
+ USER-0015-1270.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.197
+ 100.64.26.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 549280d0-0938-11ee-a886-17db84346526
+
+
+
diff --git a/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5aa3726435c5d88b17f0bee650d7d86dc79e59bb
--- /dev/null
+++ b/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.196
+ 100.64.20.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424740
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5497dc90-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a1fc73d9ae5d09ed47dc366622b59f8f1d17206
--- /dev/null
+++ b/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.251
+ 100.64.75.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 549f0b00-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb4132134ef2e1704450ec9b50872608f2b6180d
--- /dev/null
+++ b/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.227
+ 100.64.93.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693912877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54a2ea90-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f4054de1cbf76aa28edf53cf438c7297f73fd05
--- /dev/null
+++ b/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.229
+ 100.64.14.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517476
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54a67560-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a071fed9a1812dad49470fbe6f39ead8b763ca4
--- /dev/null
+++ b/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.196
+ 100.64.20.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54ac00d0-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..374f4f99fb1f54f246522b1b31664cedf0cdc317
--- /dev/null
+++ b/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.254
+ 100.64.75.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.255
+ 100.64.75.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.76.1
+ 100.64.76.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.1.40
+ HOST-13966
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+ INCIDENT_LINK
+ 1684856938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54ae2630-f981-11ed-8187-7f60e9bf0fa8
+
+
+
diff --git a/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a93ac96c33c0247d4c5e590574f5dd3a8f3d26f6
--- /dev/null
+++ b/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.106.136
+ 172.21.106.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Apache Web Server"]
+
+
+ HOST
+ 100.64.87.17
+ 100.64.87.17
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578971
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54b29ba0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578971
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54b29ba0-07d3-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f994d9d88d77ebb1badf9a0038eb9596af775db0
--- /dev/null
+++ b/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.192
+ 100.64.51.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.229
+ 100.64.82.229
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.41
+ 100.64.73.41
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54b91f20-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..435dc6ec6958efb57d2fbbeec6401a4239ca0192
--- /dev/null
+++ b/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.186
+ 100.64.92.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693912877
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54bab850-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7891ac078cca59751b91b326f1a256beb112fc9f
--- /dev/null
+++ b/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.198
+ 100.64.20.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54baf4f0-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aab29e723262a3343d55910170bcbbc84dcda420
--- /dev/null
+++ b/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.28
+ 100.64.41.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54c11a80-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c63538c1d2f37058843f30d47995018836f1c162
--- /dev/null
+++ b/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785316
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54cafff0-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8d2474fb86c382cc778436c96393f7091350cc9
--- /dev/null
+++ b/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.198
+ 100.64.20.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698424740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54cef220-74e7-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b406be2af0e1bab2bcffe6d9cc0e5bf3a5a490e5
--- /dev/null
+++ b/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.15
+ 100.64.47.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54cf6d70-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4070dcdf2e9b9dbbcd2eb6cb8434f0815336ad2
--- /dev/null
+++ b/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.94
+ 100.64.42.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.95
+ 100.64.42.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.96
+ 100.64.42.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.97
+ 100.64.42.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.98
+ 100.64.42.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.99
+ 100.64.42.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789147
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54d023f0-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1ec5ecd3c29fd549d3dd05633a8f9f3f348ae0f
--- /dev/null
+++ b/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.176
+ USER-0015-2108.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693912877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54d08a40-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d978e650cc3a22580afedcd7a8c627cec031bcc5
--- /dev/null
+++ b/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785316
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54dade70-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09fdb285d0e8770ea14761c09ab0a956489bc0c3
--- /dev/null
+++ b/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.141
+ 100.64.44.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684823867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 54de3de0-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce363aab4bfd6a6e18d76a816bc95c3552a41caa
--- /dev/null
+++ b/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.60.176
+ USER-0015-2108.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693912877
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54e6aa50-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9cad6ace8ee050594e3e4fec5e0aeb7e3aaa85d
--- /dev/null
+++ b/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.133
+ 100.64.79.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54ed9300-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54ed9300-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb19f34a91f560ce4609cdaadfa78c98c637c990
--- /dev/null
+++ b/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.41
+ 100.64.76.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54f2c320-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54f2c320-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54f2c320-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011710
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 54f2c320-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93d16ed41d05b9d94a3da15a8e1553f8ab9b0a9b
--- /dev/null
+++ b/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.15
+ 100.64.47.15
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416871
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 54f4f6d0-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1beb10bb28bf8a90306d54265d245622d6437f83
--- /dev/null
+++ b/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.44.141
+ 100.64.44.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684823867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 54fa2a50-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eec9ee723c2268c3d9591d3beeaf3c4ca6170f94
--- /dev/null
+++ b/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.41
+ 100.64.23.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447365
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5504b600-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02136b1ce4a0ddd6b9a02445d7257579e1f377d2
--- /dev/null
+++ b/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.166
+ 100.64.3.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5508c0f0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..249614def37ce8f5b5267639061025d3aeea8343
--- /dev/null
+++ b/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.27
+ 100.64.21.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1670151400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 550d0640-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 550d0640-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 550d0640-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 550d0640-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..030163e86928d21761a16bdbd825d6d50ae64d4f
--- /dev/null
+++ b/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684823868
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55115bd0-f934-11ed-8612-3352d0d722f9
+
+
+ INCIDENT_LINK
+ 1684823868
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55115bd0-f934-11ed-8612-3352d0d722f9
+
+
+ INCIDENT_LINK
+ 1684823868
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55115bd0-f934-11ed-8612-3352d0d722f9
+
+
+
diff --git a/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..154eb91d20e01c60471f0ce7bfc619aa6092a9e2
--- /dev/null
+++ b/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.17
+ 100.64.47.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 551b4380-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e48fbba4ff5d309849b669152dafb8396e4dfd8
--- /dev/null
+++ b/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.22.177
+ 172.31.22.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.19
+ 100.64.87.19
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.20
+ 100.64.87.20
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.21
+ 100.64.87.21
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.22
+ 100.64.87.22
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.23
+ 100.64.87.23
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.24
+ 100.64.87.24
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.25
+ 100.64.87.25
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578972
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 551bbdb0-07d3-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95d44aa8cbd6146685cecd1304cbdc2f5ee4755a
--- /dev/null
+++ b/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.138
+ 100.64.34.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694736652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 551fad20-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b62ff16a8f8d54c0a324d82645c81ee256a52324
--- /dev/null
+++ b/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.41
+ 100.64.23.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447365
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55229e40-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9732b63b19fd74b1333fce9b161055004fd110fc
--- /dev/null
+++ b/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.34.138
+ 100.64.34.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694736652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5522ba60-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0bbfcaa7f6eb9c7b79bda617d5a3a81f5b9dfa9
--- /dev/null
+++ b/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.236
+ USER-0015-1335.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55244380-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac69237a9b2f8ff6a97fc11ee4734568cc7be734
--- /dev/null
+++ b/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.236
+ USER-0015-1335.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55342200-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81955e501ea9e3f2ec0b0c4916c36c72c26a6eb8
--- /dev/null
+++ b/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.58
+ 100.64.30.58
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473565
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 553db3a0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03a809dd68b77fcd44e60e948ae5198eeff26e23
--- /dev/null
+++ b/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.229
+ 100.64.93.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693912878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55406310-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77e69a9f9daf74a3e0236c9fdb6025e7d083c1c1
--- /dev/null
+++ b/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.43
+ 100.64.23.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447365
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55428250-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19f9f3b2bd1e900d0ececfec94e628794dbd0e53
--- /dev/null
+++ b/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.238
+ 100.64.41.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55444ea0-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43a896508774de31e8b271b793cdb785759cd0e9
--- /dev/null
+++ b/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.15
+ 100.64.83.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657013955
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 554af9d0-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013955
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 554af9d0-fc46-11ec-b1da-11e6c916d75e
+
+
+
diff --git a/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f38c6e2d51b1501f6600a0e5ce67565bc2e27c3
--- /dev/null
+++ b/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.240
+ 100.64.52.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518039
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 554f2fe0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcab83faf4491c0c47641b79a5fa06730e7dc032
--- /dev/null
+++ b/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.240
+ 100.64.41.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5554f070-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70f243f7d2ae86b8edfef2dcc1fd4d2fed2e74ae
--- /dev/null
+++ b/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694736652
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55564d80-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d04377bd78a904b4ac2b7ba1deabbcca425069f7
--- /dev/null
+++ b/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.223
+ 100.64.45.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694735
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5556cb50-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef9fae21d3b841be78c714135fe287f0d6f97a47
--- /dev/null
+++ b/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447366
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55571bc0-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89bc483e44395523a54050e9f5389f40c61aa10c
--- /dev/null
+++ b/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.240
+ 100.64.52.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518039
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55680f10-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..646b0f75a6e2e299eab0fd69d10a6d3ac71c4fff
--- /dev/null
+++ b/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.240
+ 100.64.41.240
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 556914b0-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13fe66c98eaa124e2fd80e5426afa90633bdeb92
--- /dev/null
+++ b/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.223
+ 100.64.45.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694735
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 556ceb60-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e65d3a4fa1e54ba9f3fdc44b5b8609df5889d02
--- /dev/null
+++ b/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5578ad80-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5abe8077993ea96d4442f0df01573fea33e73d12
--- /dev/null
+++ b/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.225
+ 100.64.45.225
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 557af520-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b80fd2f5c0611b68877234903f5a6cc952f71809
--- /dev/null
+++ b/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.242
+ 100.64.41.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 557c2780-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6ebf484acfa8f2213633dc1882505a5e15896d4
--- /dev/null
+++ b/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.65
+ 100.64.8.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518039
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 557ccf90-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e88c79a8375c5bec1b56f83cd7ea0ed22f348a9
--- /dev/null
+++ b/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.242
+ 100.64.41.242
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785318
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 558af490-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d57b5850b6b18e44d9ffb91e6ea4926da1e133d
--- /dev/null
+++ b/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.225
+ 100.64.45.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 558e7d20-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2e29c2b56bcc25443759cb6ecb46e986be8e066
--- /dev/null
+++ b/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699836926
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 558ffb20-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836926
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 558ffb20-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9d97f4ce9390c68aa3cb033884ecd0a3a42f8c2
--- /dev/null
+++ b/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.155
+ 100.64.62.155
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715071176
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5591ac40-0c4d-11ef-8e07-3732a564a2cf
+
+
+
diff --git a/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d585198f119a4d056d9d2cad2d380e0992b46ee
--- /dev/null
+++ b/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.65
+ 100.64.8.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518039
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5593b2f0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28dfb7ed86a74d73a9a33412d726029580c45e1
--- /dev/null
+++ b/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.77
+ 100.64.26.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018147
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 55a689d0-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f67de07aba81a8d291807197b692119fc7a3045
--- /dev/null
+++ b/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.231
+ 100.64.93.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693912878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55b062f0-4bde-11ee-b303-01ff5f8330ea
+
+
+
diff --git a/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e08e3022301033acb10f61bd91684f20cffa5d5
--- /dev/null
+++ b/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.172.29
+ 192.168.172.29
+ []
+ 0.4375
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.196
+ 100.64.0.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55b803b0-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55b803b0-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f0c71820186fc0d35c352e036d9dcf20a6fe3b3
--- /dev/null
+++ b/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.77
+ 100.64.26.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018147
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55bbe690-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72ecc6567114398331c2725895362525c53a46a4
--- /dev/null
+++ b/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.15
+ 100.64.11.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709912061
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55c73970-dd61-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912061
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55c73970-dd61-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76a4c7b1901dffc01980f988a6c6d80f3bec52cd
--- /dev/null
+++ b/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.158
+ 100.64.91.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710973
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 55c90f60-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efce0ceb08418347ac6a696509290ace028e3422
--- /dev/null
+++ b/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.244
+ 100.64.41.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693785318
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55cfecd0-4ab5-11ee-9b83-fb7ec290b354
+
+
+
diff --git a/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fee54f879c1a57ba024dadf55731aace2fe6ccb
--- /dev/null
+++ b/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.162
+ 100.64.70.162
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.51.184
+ 100.64.51.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713797718
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797718
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797718
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797718
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7ca970010e9bd6e25262d1479c4b1d5a6fe6ba7
--- /dev/null
+++ b/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.237
+ 100.64.44.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908355
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 55f29cf0-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68f9d782264e652c07040c18864b11001adf0b84
--- /dev/null
+++ b/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.69.20
+ 100.64.69.20
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.69.21
+ 100.64.69.21
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.22
+ 100.64.69.22
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755164
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 56076ec0-e50c-11ee-9817-3f0d09cf653c
+
+
+
diff --git a/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94e895d0cb9099c9ade851d031064c4738de06df
--- /dev/null
+++ b/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831247
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 560e20e0-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3b882894633bb6a34d02ea801cbba03a1ab2964
--- /dev/null
+++ b/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.87
+ 100.64.23.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517479
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56117710-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e9a33bef0c97a9500cbb5e2619d1feb7ddffe04
--- /dev/null
+++ b/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.148
+ 100.64.80.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335684
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56188db0-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f7996bab30e9c1253c20552a38c66a3527089fc
--- /dev/null
+++ b/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.23
+ USER-0015-1491.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5618c670-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fa5227945edc88519d4661f48874d35d452abc5
--- /dev/null
+++ b/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.87
+ 100.64.23.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517479
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5622b520-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..991d2513767c554ddc334d6fa01f09dc63dc5aef
--- /dev/null
+++ b/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.148
+ 100.64.80.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335684
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5626e590-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..330a830df1aa44be361aac33beca603fca213f3c
--- /dev/null
+++ b/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.235.123
+ 192.168.248.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.4
+ 100.64.83.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662136993
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 562bf0e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136993
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 562bf0e0-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..820a152049cda77faa9bee9ac2b10d0a03941425
--- /dev/null
+++ b/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.5
+ 100.64.83.5
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.144
+ 100.64.72.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662136993
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5630d2e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136993
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5630d2e0-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b938de8b28457fbc10945497f400a66bb146e17
--- /dev/null
+++ b/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.163
+ 100.64.39.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517479
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5632bab0-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df4bde0c3bf11ce02df6e073ca7eadd10bb419e4
--- /dev/null
+++ b/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.238
+ 100.64.19.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.148
+ 100.64.16.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.218
+ 100.64.66.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.36
+ 100.64.11.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.219
+ 100.64.66.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.220
+ 100.64.66.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.246
+ 100.64.13.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.175
+ 100.64.16.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.239
+ 100.64.19.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.221
+ 100.64.66.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.222
+ 100.64.66.222
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.223
+ 100.64.66.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.224
+ 100.64.66.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+ INCIDENT_LINK
+ 1690119135
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5635d550-295d-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9d51ce2fc0b491dc509ea0703b664cb4abc2a7b
--- /dev/null
+++ b/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.47
+ 100.64.23.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447367
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 563e2060-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..283a0a724c1ae9b950528c6b82dc829f87921ca6
--- /dev/null
+++ b/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.38
+ 100.64.66.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5651f6b0-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b45b058e7e03e6d4e7d5a52e464c7f171a2fc55
--- /dev/null
+++ b/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.10
+ 100.64.69.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 565225f0-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 565225f0-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0f4e74a995a327b82ed65ae7ac05d9fb5189c3b
--- /dev/null
+++ b/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.57
+ 100.64.83.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677919710
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56529ae0-ba69-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bca9114a905684b3a27ba98de9bf2d9d3cc29503
--- /dev/null
+++ b/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.11
+ 100.64.69.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56531050-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56531050-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc1c6c4f4fe5024be14e375e0e464b4cc4fcec99
--- /dev/null
+++ b/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.26
+ 100.64.69.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696189212
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 565448c0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189212
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 565448c0-6092-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33546540edfc1a0d62a6148c881ceadb11d9c88b
--- /dev/null
+++ b/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.83.57
+ 100.64.83.57
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1677919710
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 565a14f0-ba69-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f81c75aa0b5bb98d478f7df5b0a3c960e91607a3
--- /dev/null
+++ b/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.47
+ 100.64.23.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 565e5290-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e88173d0f7adbf46acfa8436b1532f8cd2c719b0
--- /dev/null
+++ b/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.38
+ 100.64.66.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5663a9f0-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b047e705421fe1a2c0dfa880f7f11d95835f856e
--- /dev/null
+++ b/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,807 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.41
+ 100.64.66.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.169
+ 100.64.10.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.42
+ 100.64.66.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.104
+ 100.64.3.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.48
+ 100.64.16.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.43
+ 100.64.66.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.44
+ 100.64.66.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.151
+ 100.64.22.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.251
+ 100.64.13.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.45
+ 100.64.66.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.46
+ 100.64.66.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.47
+ 100.64.66.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56727700-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56da734b15deee2832f8018a6965a1fc569cbf9b
--- /dev/null
+++ b/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.193
+ 100.64.80.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335684
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5676da50-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a5fc103ca128e30a863e9b2cabfde4f4a1222c6
--- /dev/null
+++ b/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.193
+ 100.64.80.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335684
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 567d6a00-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..046cc2f6d05066dc86d27eed3761b72f496ea1e3
--- /dev/null
+++ b/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.74
+ 100.64.14.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701570377
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 567eadf0-9183-11ee-afab-0bead911b18a
+
+
+
diff --git a/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec4a02c0b739131c55dec3707eed63ad5fda41c1
--- /dev/null
+++ b/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 56811d00-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..301e0b45e499c6c30315c47dee0eea0651c22579
--- /dev/null
+++ b/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.174
+ USER-0015-2047.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720388776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 568eca00-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 568eca00-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 568eca00-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 568eca00-3caa-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d73cdf9e928a05fa7a4aabbf14b50c0dbaa297d
--- /dev/null
+++ b/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 56903830-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b61c1b81eda31f6b9a0707e00f8e767d4f0701fd
--- /dev/null
+++ b/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.116.1
+ 172.25.116.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.33
+ 100.64.87.33
+ ["Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578974
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 56a4a7a0-07d3-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578974
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 56a4a7a0-07d3-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42ac59bed54e0a2e05d2555ee8930fb74da1a841
--- /dev/null
+++ b/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 56a4d1a0-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb493f51a554436ae93518d2bd70a9e55a6c124e
--- /dev/null
+++ b/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.83
+ 100.64.29.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.178
+ 100.64.60.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.167
+ 100.64.24.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.179
+ 100.64.60.179
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.180
+ 100.64.60.180
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.181
+ 100.64.60.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.182
+ 100.64.60.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.107
+ 100.64.60.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.183
+ 100.64.60.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.189
+ 100.64.45.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456588
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56a539f0-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9c5952405edbf692df456003fc366fbe183bf89
--- /dev/null
+++ b/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715071177
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56b21060-0c4d-11ef-8e07-3732a564a2cf
+
+
+
diff --git a/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6b5fca64f613323212c22502fb3557d91e1c1b6
--- /dev/null
+++ b/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.195
+ 100.64.80.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56bf5500-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cabbf11a718066573eb78abba54ee45445cbf2eb
--- /dev/null
+++ b/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.195
+ 100.64.80.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 56c659e0-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98c0f1292ebff02284985138a639a8b179b1d879
--- /dev/null
+++ b/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715071178
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 56c682c0-0c4d-11ef-8e07-3732a564a2cf
+
+
+
diff --git a/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7838f96c92f8ac292dc0e45928943dce693b70a
--- /dev/null
+++ b/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.196
+ 100.64.80.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.41
+ 100.64.72.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56e66500-1a7c-11ed-962e-e94bb46215af
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 56e66500-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8635fa8d4bb0320d35a51e1b48e91ab0ba75888c
--- /dev/null
+++ b/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.109
+ 100.64.75.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 56eaaac0-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b28567916023550f6c4655ce823d6d5e64d966b9
--- /dev/null
+++ b/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.109
+ 100.64.75.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660335685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 56efdae0-1a7c-11ed-962e-e94bb46215af
+
+
+
diff --git a/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a027c9ac26e82a9f13a8de118e584b1f24c6e25
--- /dev/null
+++ b/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml
@@ -0,0 +1,393 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.22.246
+ 100.64.22.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.189
+ 100.64.69.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.37.97
+ 100.64.37.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.190
+ 100.64.69.190
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 56f717f0-866f-11ee-8f03-878f88d78f03
+
+
+
diff --git a/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a7e9cb6c1d9efb31b74c8feb54403e699fa1aae
--- /dev/null
+++ b/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.40
+ 100.64.59.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 56fbb530-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e3f9cf02b2d7e96b2d0b9d08a719b4ab26f42f8
--- /dev/null
+++ b/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.180.115
+ 192.168.180.115
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.89.185
+ 100.64.89.185
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.168.158.15
+ 192.168.158.15
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5706c910-7bdf-11ee-b624-7d3a11587cf9
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5706c910-7bdf-11ee-b624-7d3a11587cf9
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5706c910-7bdf-11ee-b624-7d3a11587cf9
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5706c910-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24645948a2d1c6ad5c56f29b3183fe042a8ecaa6
--- /dev/null
+++ b/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.68
+ 100.64.37.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57094100-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6ee8edebb48e3140e3339372a8d3b883caf7073
--- /dev/null
+++ b/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.40
+ 100.64.59.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831249
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 570eef10-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02b2020db937eedc50ffe9a7a74cb5c87b2fb3c9
--- /dev/null
+++ b/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.187
+ 100.64.89.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57140f80-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b8d62544ccf2be41d0f37e5ee4a2471b91f1b2b
--- /dev/null
+++ b/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.68
+ 100.64.37.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 571b1b50-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4088de1f62975618e4f4223f498a98c63b2b2fb
--- /dev/null
+++ b/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.89.187
+ 100.64.89.187
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57212ee0-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml b/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bead2919343dfd1aff585c08e18223c0af54df99
--- /dev/null
+++ b/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml
@@ -0,0 +1,517 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.60
+ 100.64.18.60
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.139
+ 100.64.71.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.177
+ 100.64.71.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.178
+ 100.64.71.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ USER-0015-1622.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.180
+ USER-0015-1623.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.181
+ 100.64.71.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.182
+ 100.64.71.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ 100.64.1.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.183
+ 100.64.71.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.184
+ 100.64.71.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.185
+ 100.64.71.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.37
+ HOST-12731
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.186
+ 100.64.71.186
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+ INCIDENT_LINK
+ 1657963145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 572c53c0-04e8-11ed-9475-7d81a00fe647
+
+
+
diff --git a/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d171b69d98729798839fbc11d9cf0a6d9e63e016
--- /dev/null
+++ b/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710976
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 572e1da0-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e371880c4fb595873064cb56f264a1f6324499b
--- /dev/null
+++ b/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677710976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 573151f0-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe46c26b0513aab48225e58addf798cdc8da40b0
--- /dev/null
+++ b/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710976
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57354990-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8d0d91ba7c6c274d392c7b1c8a975b89fffb749
--- /dev/null
+++ b/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.43
+ 100.64.35.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57428d60-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6c724e91d54a3ab94ee81ca09acfbc28fd6581f
--- /dev/null
+++ b/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.29
+ 100.64.15.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690865172
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5745d970-3026-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865172
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5745d970-3026-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d9dafa5206639bde2ee7ec0cfc3125aa30e9283
--- /dev/null
+++ b/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,867 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.190
+ 100.64.60.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.47
+ 100.64.34.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.4
+ 100.64.50.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.88
+ 100.64.9.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.191
+ 100.64.60.191
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.54
+ 100.64.37.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.192
+ 100.64.60.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.129
+ 100.64.23.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.193
+ 100.64.60.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.194
+ 100.64.60.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456589
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 574c9d80-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff13b0a0760a710edba5ac2021b3cea9cceade5e
--- /dev/null
+++ b/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.25
+ 100.64.23.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 574c9f40-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17f7e219d2cd8405e8886c50936d9be8eb7a4f59
--- /dev/null
+++ b/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,213 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ HOST-17989
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.210
+ 100.64.90.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.99
+ 100.64.61.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.211
+ 100.64.90.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389207
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57509df0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d3af2ab5ff8ba847e22f90b1c5488b1882a5c69
--- /dev/null
+++ b/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.43
+ 100.64.35.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5752e110-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee07d902d583ce4d50d0c375935cd3c74ad57dc9
--- /dev/null
+++ b/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.58
+ 100.64.64.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.118
+ 100.64.43.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.161
+ 100.64.20.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.98
+ 100.64.21.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+ INCIDENT_LINK
+ 1702797880
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 575927c0-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea6844d7b8c2737260c6bc8d3ac0582e3ac6e7c6
--- /dev/null
+++ b/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1699190966
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 575efb30-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e8d08424b8c9cc845bf10d610c371873af96cd9
--- /dev/null
+++ b/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.25
+ 100.64.23.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5762bf50-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e0a3efcfad2d2fa1eafd768116320cd0372ff26
--- /dev/null
+++ b/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.45
+ 100.64.35.45
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57649450-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2f42fa202bebfdddf99359c0feb333af8d68c88
--- /dev/null
+++ b/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.199
+ 100.64.69.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692216369
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576562d0-3c70-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216369
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576562d0-3c70-11ee-89e7-7976671c0f18
+
+
+
diff --git a/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e03a7e3520df6e35249df529780c91e0a1ad1eb
--- /dev/null
+++ b/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.112
+ 100.64.41.112
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692216369
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5766e970-3c70-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216369
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5766e970-3c70-11ee-89e7-7976671c0f18
+
+
+
diff --git a/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7348d850f5f26fbabbcce77bd361930ba6a1ddd3
--- /dev/null
+++ b/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.200
+ 100.64.60.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.201
+ 100.64.60.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456590
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 576c5a80-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d436821bbf077713a9e2f6090bf80320793de0d3
--- /dev/null
+++ b/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699190967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 576d04f0-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f971065e9699399e4afd29ce2565249d82d16c1
--- /dev/null
+++ b/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,717 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.13
+ 100.64.77.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.940673828125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.14
+ 100.64.77.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.15
+ 100.64.77.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.16
+ 100.64.77.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.127
+ 100.64.72.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.1.37
+ 100.64.1.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.19.150
+ 100.64.19.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.97943359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.17
+ 100.64.77.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.31.15
+ 100.64.31.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.49
+ 100.64.72.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.18
+ 100.64.77.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.19
+ 100.64.77.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761948
+ malicious
+ 0.97943359375
+ 0.97943359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a79ed2439840c273f7afde33187c7371a5b90f2e
--- /dev/null
+++ b/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.164
+ 100.64.80.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659285996
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576ead60-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659285996
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 576ead60-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09850b45f3b3fd87458d7108ea1fd92b01f75e92
--- /dev/null
+++ b/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.138
+ 100.64.43.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5770af30-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70b72b2637eee269bbbbc22edda50e1196bf4682
--- /dev/null
+++ b/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.76
+ 100.64.64.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57770aa0-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e2c940b601912522009ed59a916fa45894f7d02
--- /dev/null
+++ b/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.117
+ 100.64.6.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557029
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 577ba6a0-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0270420b62b83fc77149110b8c310c644a852be0
--- /dev/null
+++ b/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.222
+ USER-0015-1311.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 577dd850-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..310acb5b014cdeb7839c22c53bb5889b2407c252
--- /dev/null
+++ b/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.196
+ 100.64.81.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.89
+ 100.64.80.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.197
+ 100.64.81.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.111
+ 100.64.80.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.198
+ 100.64.81.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578006b0-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfc62fe69d62a3082af8f29e2994846cb3b8d9ff
--- /dev/null
+++ b/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.138
+ 100.64.43.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d12268a4408efda27a00c42e22357dc19f3e710a
--- /dev/null
+++ b/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.55
+ 100.64.82.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.56
+ 100.64.82.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.57
+ 100.64.82.57
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.24
+ 100.64.23.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.58
+ 100.64.82.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.62.137
+ 100.64.62.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.23.141
+ USER-0015-1918.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.59
+ 100.64.82.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760805
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5784c2a0-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10278cf36bba62f0ef921f1e3113ae81466c017f
--- /dev/null
+++ b/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.53.225
+ 100.64.53.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.23.175
+ 100.64.23.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051706
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578ca110-28c0-11ee-9c7b-cd7423cdcafa
+
+
+
diff --git a/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..904c14f86cffa1e1623977f2eac8f9383b3faaf2
--- /dev/null
+++ b/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.117
+ 100.64.6.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557030
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 578d0bc0-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1d04ceeefae34a0b40367a5c2f1439d2598dca2
--- /dev/null
+++ b/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.222
+ USER-0015-1311.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517481
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 578db6d0-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0b742401c881b861a0a40ee541503b56157769b
--- /dev/null
+++ b/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.76
+ 100.64.64.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 578dee00-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee9b8e9c7239a71cd164a4bfe0756c5b3e3785e5
--- /dev/null
+++ b/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.140
+ 100.64.43.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 578f33b0-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c90f1f8cc77ddf9b7cabdde6c44bba05f48d88a6
--- /dev/null
+++ b/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,489 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.29
+ 100.64.17.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.79
+ 100.64.26.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.83
+ 100.64.23.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.107
+ 100.64.19.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.80
+ 100.64.26.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.81
+ 100.64.26.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.82
+ 100.64.26.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 579f73a0-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9f0a8c0c5facdf8edf9e3cb5c03fa667b590678
--- /dev/null
+++ b/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 579fca40-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ce32d710ddc2405aacc8f9171124147d7e13733
--- /dev/null
+++ b/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.142
+ 100.64.43.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57a21f70-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b6ea0dc111ce11605c787cb092527c51817e02d
--- /dev/null
+++ b/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.30
+ 100.64.65.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158949
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57a24f80-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc5b8190353c13da28d5b9805d9b1fe7d77e5a52
--- /dev/null
+++ b/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.13
+ 100.64.29.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901777
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57a44350-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901777
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57a44350-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d53400798cdd608884f61282423859f49033da0d
--- /dev/null
+++ b/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.29
+ 100.64.17.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710018150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57b17500-de58-11ee-aaa4-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bc0af71a52c946ff2fae4565a363e77c40ed1bb
--- /dev/null
+++ b/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e8864624602f3961bc9b3571dae54e7785b10de
--- /dev/null
+++ b/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.69
+ 100.64.69.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1690865173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57b4eef0-3026-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57b4eef0-3026-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67e55586d2c26fd16e88e519b73eef020abb4afb
--- /dev/null
+++ b/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528129
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57b5ea50-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e04518a690efe97d943453e11ce959b1a436771
--- /dev/null
+++ b/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.227
+ 100.64.45.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57bd9220-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d1118ff3f4e8886b57ada41f86197297a01c5c2
--- /dev/null
+++ b/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57c49b90-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f67387ebdcd2d91399ebe3c7b6487e761503dc2c
--- /dev/null
+++ b/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.227
+ 100.64.45.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57d0cc00-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml b/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5ee624ee704c196b5b696f82f07f76f8cf8b5d1
--- /dev/null
+++ b/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.124
+ 100.64.71.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.125
+ 100.64.71.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660263102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57d16d10-19d3-11ed-a648-2b78b076beb3
+
+
+ INCIDENT_LINK
+ 1660263102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57d16d10-19d3-11ed-a648-2b78b076beb3
+
+
+ INCIDENT_LINK
+ 1660263102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57d16d10-19d3-11ed-a648-2b78b076beb3
+
+
+ INCIDENT_LINK
+ 1660263102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57d16d10-19d3-11ed-a648-2b78b076beb3
+
+
+
diff --git a/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39949fd7e2b1502d6134b72ce83c8d19ce3276d7
--- /dev/null
+++ b/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.157
+ 100.64.62.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702596876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57d85480-9ad9-11ee-a153-0bcaae5115e2
+
+
+
diff --git a/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7aa056a2207a31c479047666c97d2f504840f3f
--- /dev/null
+++ b/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.219
+ USER-0015-1813.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.87625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.217
+ 100.64.71.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.242
+ 100.64.71.242
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661011714
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57d856e0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011714
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57d856e0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011714
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57d856e0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011714
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57d856e0-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0137349442141fae2b4f7d7c55f6e657249c2691
--- /dev/null
+++ b/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.19
+ 100.64.47.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 57dd97d0-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a85e8173d996ade89b386bc8ba38a43d7a2a91fb
--- /dev/null
+++ b/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.60
+ 100.64.64.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797881
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57ded280-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7c60fb571eb44edc738d089befbb370f47c3724
--- /dev/null
+++ b/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.16
+ 100.64.79.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208950
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57e857b0-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208950
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 57e857b0-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a956f3ada1c5054f7598ca6fc56f68a6cbb0ff8
--- /dev/null
+++ b/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.19
+ 100.64.47.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 57f90f10-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56ffe7185bac7c2b1c5df3ac4ea9e89e756655bd
--- /dev/null
+++ b/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.47
+ 100.64.35.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131496
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 580cbb30-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffb8f5fb937bf30c041b3c23743a3c8ca9eac47f
--- /dev/null
+++ b/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,495 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.204
+ 100.64.60.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.205
+ 100.64.60.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.219
+ 100.64.28.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.136
+ 100.64.2.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.51
+ 100.64.58.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.183
+ 100.64.23.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.34
+ 100.64.7.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.32
+ 100.64.42.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.123
+ 100.64.42.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.206
+ 100.64.60.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.207
+ 100.64.60.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.158
+ 100.64.44.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.208
+ 100.64.60.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456591
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 580f0320-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..925d3cc8e2b7dcb6bb7500630b0fd4bb384663d7
--- /dev/null
+++ b/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.113
+ USER-0015-2032.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1699190968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58113430-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61f6a2714c86396a4160ebc889e21eb169bcffb2
--- /dev/null
+++ b/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.21
+ 100.64.47.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58160cf0-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b5075c587b3639ff4bd704ee922ca919dbf52be
--- /dev/null
+++ b/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.132
+ 100.64.4.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709912065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58179210-dd61-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbe7bd3b98de344097efb36a16c9163fdd0109f4
--- /dev/null
+++ b/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.58.113
+ USER-0015-2032.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699190968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 581f6500-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8296096a64f33e808951ede86b8c3b9487ea107
--- /dev/null
+++ b/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,97 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.12
+ 100.64.69.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1703084355
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 581fe110-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084355
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 581fe110-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084355
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 581fe110-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92d8d7a1f390390508040b506de42d548019cebc
--- /dev/null
+++ b/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.47
+ 100.64.35.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131496
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5820b860-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..286373f4cc937102e4daca1fb879d4f1bb2ce4f7
--- /dev/null
+++ b/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.142
+ 100.64.12.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 582bb7d0-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df06eb18e3178423f59263d467f284a1b0a94577
--- /dev/null
+++ b/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.141
+ USER-0015-1368.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 582c6120-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43b869e551ad8703e956abb231fff3c86f784d20
--- /dev/null
+++ b/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.4.132
+ 100.64.4.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709912065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 582ca0b0-dd61-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9e5e279e237fca1f5c040cc446a07e7b6dbd25f
--- /dev/null
+++ b/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.49
+ 100.64.35.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131496
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5835ee10-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e03b5b699b991cda4aac70b0b8db1fe6034a4636
--- /dev/null
+++ b/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.156
+ 100.64.19.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5840d380-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10723a2e143d14c2bf00332ec2918b648242a027
--- /dev/null
+++ b/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.142
+ 100.64.12.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686416876
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58413ba0-07b1-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25687082b8857a1d65eb160f910c5a9f7ff664e0
--- /dev/null
+++ b/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.49
+ 100.64.35.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694131496
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 584668d0-4ddb-11ee-9c4b-a19d1bad2d38
+
+
+
diff --git a/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57e74296e40b85a2bcf704289758570c3b24ac56
--- /dev/null
+++ b/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.96
+ 100.64.54.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797882
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 584ab3b0-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b058a2dca2ddcd0f772e008167ab2af7fb707f2
--- /dev/null
+++ b/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.170
+ 100.64.43.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725435
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 585286c0-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..470c997e650287df14730de56b4b7b43c1ff2313
--- /dev/null
+++ b/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.112
+ 100.64.76.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.199
+ 100.64.81.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58629e80-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ac27300a5294b2eb6883e1dc5e7dc9e8307a9d1
--- /dev/null
+++ b/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.96
+ 100.64.54.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797882
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5862f6a0-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4d25826d7a1ef5b46fa4426e2eeb9f979ef1d7c
--- /dev/null
+++ b/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5863e440-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fe3f52c15711ac58291090898531c7886e380f4
--- /dev/null
+++ b/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.200
+ 100.64.81.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.201
+ 100.64.81.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.202
+ 100.64.81.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58644c30-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfdef454c5b090c76dae1212fc54ed53697faa0b
--- /dev/null
+++ b/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58664120-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40facb3e46be6f6cf5a5780b28761b0f702f1d68
--- /dev/null
+++ b/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.170
+ 100.64.43.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725435
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 586c5050-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ca4128653f1495c9a48368989b2f738164b1219
--- /dev/null
+++ b/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.89
+ 100.64.40.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5873aea0-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6764c84d905ca7ea950ba44beb3e8172551c83ad
--- /dev/null
+++ b/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.62
+ 100.64.64.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797882
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58763080-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ccfaf383ebf650693ffc0ecbfad6a0a8afccd1d
--- /dev/null
+++ b/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,711 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.20
+ 100.64.77.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.45
+ USER-0015-1748.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.21
+ 100.64.77.21
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.22
+ 100.64.77.22
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.72
+ 100.64.72.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.74.217
+ 100.64.74.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.23
+ 100.64.77.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.24
+ 100.64.77.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.20
+ 100.64.73.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.42.128
+ 100.64.42.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.214
+ 100.64.72.214
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.45.196
+ 100.64.45.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.25
+ 100.64.77.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.26
+ 100.64.77.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.27
+ 100.64.77.27
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.28
+ 100.64.77.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7056e2ca4a4ca74ed47185fa26646a51bc41a0fe
--- /dev/null
+++ b/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 587cea80-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b87b7b34d47ac6d21b248a62a7fba02f3b65833
--- /dev/null
+++ b/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.41
+ 100.64.54.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ HOST-17780
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1699190968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 587cee50-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e731982d2f34a9f9f8ef8db1e4c4040073d5e879
--- /dev/null
+++ b/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.143
+ 100.64.47.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725436
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 587fb140-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1c2b6a502932886dd6ca6ce9605e8dd9a568c7b
--- /dev/null
+++ b/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.89
+ 100.64.40.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58820680-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..283e332aeaca2c6d07f13cc5c257fcc2d82fef1b
--- /dev/null
+++ b/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.144
+ 100.64.68.144
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.31
+ 100.64.11.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588558f0-28c0-11ee-9c7b-cd7423cdcafa
+
+
+
diff --git a/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8816f6e1dfab4a540903d9eb07770a757c39e3a3
--- /dev/null
+++ b/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.62
+ 100.64.64.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797882
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5885e7f0-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f6d93cde02ebbba894fc5d5d568152d77598210
--- /dev/null
+++ b/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ HOST-17780
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.54.41
+ 100.64.54.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1699190968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 588bbb60-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df4b333b60151741ec69ca4156c07ce575837d70
--- /dev/null
+++ b/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.205
+ 100.64.49.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 588ed7c0-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4a74a512b9ff7e47a1e1e6332646877f9650117
--- /dev/null
+++ b/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321632
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 58918670-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5469e4291607a4283577fac8800f2dee60e46ca3
--- /dev/null
+++ b/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,315 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.24
+ 100.64.45.24
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.178
+ 100.64.61.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.179
+ 100.64.61.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.180
+ 100.64.61.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.181
+ 100.64.61.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.228
+ 100.64.41.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589438f0-242a-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe310a7d1e6cfd343d05668075d5cb8dfe73765f
--- /dev/null
+++ b/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.143
+ 100.64.47.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725436
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5895f860-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..247a97fba82bffd8adf93f0bf42cc11da8a130da
--- /dev/null
+++ b/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.205
+ 100.64.49.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 589e1a00-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0025aba99d04a82f4e65da8b55abe153b3aec7aa
--- /dev/null
+++ b/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.15
+ USER-0015-1963.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 589f4c30-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24fb6e21b90870ff090dbedcf57159297d3fa367
--- /dev/null
+++ b/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.40
+ 100.64.66.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695321633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 58a2c480-58ae-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dce728bdbb14b03ad411a27cd1803a711726bb9
--- /dev/null
+++ b/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.144
+ 100.64.46.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.186
+ 100.64.61.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.187
+ 100.64.61.187
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.188
+ 100.64.61.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.189
+ 100.64.61.189
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.105
+ 100.64.20.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.187
+ 100.64.37.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.190
+ 100.64.61.190
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.191
+ 100.64.61.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.192
+ 100.64.61.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.193
+ 100.64.61.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.194
+ 100.64.61.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.195
+ 100.64.61.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.120
+ 100.64.5.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.40.227
+ 100.64.40.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.196
+ 100.64.61.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58a3f060-242a-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cf0e9a6665845f234a4ad6337e85cd8dc9b7553
--- /dev/null
+++ b/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.156
+ 100.64.22.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725436
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58a95950-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..904bbea3dffb4b6dbcceae613faf235859f44f85
--- /dev/null
+++ b/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58aaeb40-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0cd715b6f1be835b1cc2b1950eae34d3c142e13
--- /dev/null
+++ b/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml
@@ -0,0 +1,445 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.183
+ 100.64.23.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.161
+ 100.64.70.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.144
+ 100.64.68.144
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.31
+ 100.64.11.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ab5780-28c0-11ee-9c7b-cd7423cdcafa
+
+
+
diff --git a/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cd9c04a1aef3c8872a6a701fed8b36f3224ab4b
--- /dev/null
+++ b/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.163
+ USER-0015-1762.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ 100.64.1.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.83.6
+ 100.64.83.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662136997
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ab96e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136997
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ab96e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136997
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ab96e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136997
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ab96e0-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..754048dc55e2e960a144424cd200a68be5760487
--- /dev/null
+++ b/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.195
+ 100.64.31.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 58adc550-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70951630051027fdb182a51b31c14491535ce80f
--- /dev/null
+++ b/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.25
+ 100.64.20.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58b19bb0-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03d38ea58bfdce15a43c8a0652d84e0a68c0bbc0
--- /dev/null
+++ b/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.238
+ 100.64.36.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695541964
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58b38240-5aaf-11ee-892e-3b87e68adb1a
+
+
+
diff --git a/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..937ccb0326f4ae698326a821562e4c960eee81b6
--- /dev/null
+++ b/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695541964
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58b5f340-5aaf-11ee-892e-3b87e68adb1a
+
+
+
diff --git a/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66d84f81b70a1a45080f9562e64cfefc502d4b68
--- /dev/null
+++ b/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695541964
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58b83d30-5aaf-11ee-892e-3b87e68adb1a
+
+
+
diff --git a/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30f7efb70c320883356179793057dada128761d0
--- /dev/null
+++ b/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.113
+ 100.64.85.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673515225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c23c496aa2cd33d5fad26b44ff595eb4368cb8b
--- /dev/null
+++ b/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.154
+ USER-0015-1947.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ba0430-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d573ef3e22376de8991734a8edee788f7945c3d9
--- /dev/null
+++ b/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58ba7ba0-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ad75acb822bbba2877707081c759ffd57d6278d
--- /dev/null
+++ b/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.195
+ 100.64.31.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 58bbcf10-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cb82cef8d91c7661cc2e2f21573767be26d0709
--- /dev/null
+++ b/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.156
+ 100.64.22.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725436
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58bda4a0-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69a72e69ad4876be1851518bceed7c8e93bff17a
--- /dev/null
+++ b/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.113
+ 100.64.85.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673515225
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a4248322bb4fe5504a4cb3ed45a1d1d9e2099c4
--- /dev/null
+++ b/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.20.25
+ 100.64.20.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58c10500-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1eed7c2a561341e5058af35759417d77c97aefab
--- /dev/null
+++ b/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.88
+ 100.64.55.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.208
+ 100.64.61.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.209
+ 100.64.61.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.58
+ 100.64.25.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.210
+ 100.64.61.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.211
+ 100.64.61.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.193
+ 100.64.28.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.212
+ 100.64.61.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.213
+ 100.64.61.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+ INCIDENT_LINK
+ 1717694976
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58c3d470-242a-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec75026509c01d28b24d6b87cef8e13f4994516b
--- /dev/null
+++ b/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.245
+ 100.64.19.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58c79b00-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..958a36ebaf9bcacc4f1346037fc8fb5fd0fd28a3
--- /dev/null
+++ b/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.154
+ USER-0015-1947.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58c99490-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daaaa07865aad5aaf6d013f5741647cd2359bbbb
--- /dev/null
+++ b/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.239
+ USER-0015-1344.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58cbd4a0-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa2328dd92b9fc9c4d4f6792adfe7a876163e4b1
--- /dev/null
+++ b/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,827 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.181
+ 100.64.16.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.103
+ 100.64.10.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.214
+ 100.64.60.214
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.215
+ 100.64.60.215
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.216
+ 100.64.60.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.217
+ 100.64.60.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.218
+ 100.64.60.218
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.45
+ 100.64.28.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.135
+ 100.64.23.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.225
+ 100.64.4.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.84
+ 100.64.8.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.250
+ 100.64.25.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.235
+ 100.64.11.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.219
+ 100.64.60.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456592
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58d47600-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8413bd1a014d3bfe939dc82294c1b757fe7f8a71
--- /dev/null
+++ b/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58d50230-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f85aef4b58f36ea26cec32787b26c83f8831a2a
--- /dev/null
+++ b/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.245
+ 100.64.19.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58d5f2e0-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4211248af6ebb61d9799a435efbb4008655aac0
--- /dev/null
+++ b/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.239
+ USER-0015-1344.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58db16e0-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8649c26aa9ce37701d4ebcbb36650682331d7e07
--- /dev/null
+++ b/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58de5510-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a35514d94511fd0d68f11d3ec356ea76d1334367
--- /dev/null
+++ b/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700562352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58e29d10-8858-11ee-9c47-2b6116201e48
+
+
+
diff --git a/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5643515cd1a2a966d8292173eeb0c8b7ff197546
--- /dev/null
+++ b/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58e83c10-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3d3ea67622f27242bc0e06f4851981953f2800d
--- /dev/null
+++ b/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.241
+ 100.64.44.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58ea5920-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bec6f2a51e12b1693bd630b16a363cadc37172e2
--- /dev/null
+++ b/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.189
+ 100.64.89.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1699190969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58eacb50-7bdf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9836c5e9369597ae2cd7f95ac736b495a2f1ee60
--- /dev/null
+++ b/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 58f140d0-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dce05c28f64daf6d2ae1f7e014b983454ebb0b46
--- /dev/null
+++ b/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.19
+ USER-0015-1964.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e25417de7f560903139c92bc4ad6510e72705891
--- /dev/null
+++ b/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702596878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 58f86a80-9ad9-11ee-a153-0bcaae5115e2
+
+
+
diff --git a/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afb89a44044be91d84640f0c860288feb23263ea
--- /dev/null
+++ b/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.112
+ USER-0015-1339.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011169
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58f9ab70-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..060888c7b3eb41bbb88b497c57133926471f09b3
--- /dev/null
+++ b/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.62
+ 100.64.51.62
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936375
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 58fe1580-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..508f6e9564150f3d6396abe8da04e99fb8116d57
--- /dev/null
+++ b/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.51
+ USER-0015-1948.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5900f840-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a4439b1e9d8e9b858c957420bf4c71a1f4618e5
--- /dev/null
+++ b/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.184
+ 100.64.17.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702596878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 590821f0-9ad9-11ee-a153-0bcaae5115e2
+
+
+
diff --git a/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06661518cd00fc877f175d85304023cf3a15a479
--- /dev/null
+++ b/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.118
+ 100.64.41.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 590a2d20-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..490b2d7e6d8d64dfaf5f105fd50980108e84cd3b
--- /dev/null
+++ b/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.29
+ 100.64.77.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.30
+ 100.64.77.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665761950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cd758d5808607e8b94e29ba91b1b76eb8462573
--- /dev/null
+++ b/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.34.51
+ USER-0015-1948.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59101370-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..791e291661f51e7a8801c6df2fc8013a7360b559
--- /dev/null
+++ b/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.20
+ 100.64.84.20
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5911e420-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..def33da260ad4a1834c48582c58f08a75eabac97
--- /dev/null
+++ b/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.0.111
+ 100.64.0.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 192.168.89.158
+ 192.168.89.158
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660006694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 591dd980-177e-11ed-b397-31ec3715e69d
+
+
+ INCIDENT_LINK
+ 1660006694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 591dd980-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f32937b1e8286c18fa9d9c65a5756e07a7584eb3
--- /dev/null
+++ b/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.162
+ 100.64.83.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59204010-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2425e8b7a95f8df3293d6266131db401330191b2
--- /dev/null
+++ b/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660006694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5925efd0-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526bc4846fc28e04d3e0b91734d6e868220861f8
--- /dev/null
+++ b/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59272d90-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7ff854f831829f4cdfcc965f1626647748f7c14
--- /dev/null
+++ b/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.113
+ 100.64.10.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.1.231.219
+ 10.1.231.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1694032284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 592c9810-4cf4-11ee-8f16-29e9aef3faf6
+
+
+
diff --git a/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6aaa345bafec365fc38e0173515e3aad392bd62
--- /dev/null
+++ b/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660006694
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 592e5440-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09f602962fa6f5c4aca26143f129cd07595d32f9
--- /dev/null
+++ b/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.162
+ 100.64.83.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292061
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 593575c0-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5b4200d068aa9f2636b0e24898e8f69c3eccfb5
--- /dev/null
+++ b/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.175
+ 100.64.32.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522971
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5938ec10-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c43a17f259c0b9a8e7616a0cb56e16921a3e04c
--- /dev/null
+++ b/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.239
+ 100.64.82.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660006694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59490830-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5ceabdbcd1abf8ec1e38e9de1bb576d55f84a37
--- /dev/null
+++ b/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.175
+ 100.64.32.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522971
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 594a0310-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8728ac41dc0bce45ef31dbdce2086711d1af3f4
--- /dev/null
+++ b/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.239
+ 100.64.82.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 594f97e0-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21142bcad058230d67c898d1e2fccb7e66c1d302
--- /dev/null
+++ b/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.48
+ 100.64.19.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725437
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 594fab70-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4457bd83fa09b04765bb8a9bd73ceb6d87002080
--- /dev/null
+++ b/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.17
+ 100.64.32.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59526db0-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17b5c09917f42ee3f7c9fcacbd51b2bb2a385123
--- /dev/null
+++ b/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.240
+ USER-0015-1935.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.252
+ 100.64.71.252
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59551620-177e-11ed-b397-31ec3715e69d
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59551620-177e-11ed-b397-31ec3715e69d
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59551620-177e-11ed-b397-31ec3715e69d
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59551620-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a712e3e92350d05b59495db8629653959eb0271
--- /dev/null
+++ b/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.48
+ 100.64.19.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714725437
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 595e9f90-0928-11ef-b19d-8b7251a5657d
+
+
+
diff --git a/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6c54ebf6c7cedc976c03df80c7c85da7423a58f
--- /dev/null
+++ b/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.244
+ USER-0015-1936.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595eb310-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8496121e224d74055668c94938c69f75e3fcc79b
--- /dev/null
+++ b/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.144
+ 100.64.68.144
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.31
+ 100.64.11.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+ INCIDENT_LINK
+ 1690051709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 595ef010-28c0-11ee-9c7b-cd7423cdcafa
+
+
+
diff --git a/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6671b945be0a05db99b647383c541ea263715f8d
--- /dev/null
+++ b/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.17
+ 100.64.32.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59644800-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5552113666f19d9dcd9e0bf03418ae5c69743783
--- /dev/null
+++ b/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.244
+ USER-0015-1936.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5967b3c0-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f82458b774a17293eda1166a436a7a48826db25e
--- /dev/null
+++ b/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.64
+ 100.64.51.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936375
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 596dc740-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1e231e7d9b621664ce112416d7091fe8a8a1ae6
--- /dev/null
+++ b/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.114
+ 100.64.43.114
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011170
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 596eb460-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bd1aed50e1c4df3beabb39702107071b4f9065e
--- /dev/null
+++ b/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.133
+ 100.64.47.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335246
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5970a170-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaa57de7db8d94274d4061ce79562cd6dfe63d7e
--- /dev/null
+++ b/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.241
+ 100.64.82.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.242
+ 100.64.82.242
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59756f60-177e-11ed-b397-31ec3715e69d
+
+
+ INCIDENT_LINK
+ 1660006695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59756f60-177e-11ed-b397-31ec3715e69d
+
+
+
diff --git a/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a33d351c37427b6cee0cc270ef47d40da6f409d8
--- /dev/null
+++ b/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.164
+ USER-0015-1949.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292061
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59764f50-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d20e06a8950de18b58d53e7e3396ed5a8bc79bb
--- /dev/null
+++ b/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.33
+ 100.64.44.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 597e86e0-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d80da6f7be583f84433a9bcb6a45b06d36a01c5d
--- /dev/null
+++ b/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.64
+ 100.64.51.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936375
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 597fa190-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a78fd8dd65e585e180764d4e3dfab03203d2a21
--- /dev/null
+++ b/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.135
+ 100.64.47.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335246
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5989a7b0-61e6-11ee-b713-27a48af32cd1
+
+
+ INCIDENT_LINK
+ 1696335246
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5989a7b0-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbe45580d544fefb6968202cae12f13844b2f5a1
--- /dev/null
+++ b/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.33
+ 100.64.44.33
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005829
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 598fc4f0-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6711048d885909a1f1ef9bed0a6ad64e4aa05a54
--- /dev/null
+++ b/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.102.86.174
+ 10.102.86.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.164
+ USER-0015-1949.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1688292061
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5992d800-18bf-11ee-9538-c5149dbd1e2e
+
+
+
diff --git a/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml b/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac1c930cdb05d5528b77160e1b4df9f910913800
--- /dev/null
+++ b/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.46
+ 100.64.21.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.137
+ 100.64.74.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5997d040-f236-11ec-9232-17ec7cc98ff9
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5997d040-f236-11ec-9232-17ec7cc98ff9
+
+
+
diff --git a/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0c6cdfcdbf99a5b0cde5cac9f1e85a163c88f53
--- /dev/null
+++ b/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.135
+ 100.64.47.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335246
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 599feed0-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml b/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cf98f70c0de5230c27f65c8ff5c892b70071042
--- /dev/null
+++ b/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.25.246
+ USER-0015-1945.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.0.105
+ 100.64.0.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.77.168
+ 192.168.77.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59a0d0f0-f236-11ec-9232-17ec7cc98ff9
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59a0d0f0-f236-11ec-9232-17ec7cc98ff9
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59a0d0f0-f236-11ec-9232-17ec7cc98ff9
+
+
+ INCIDENT_LINK
+ 1655907578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59a0d0f0-f236-11ec-9232-17ec7cc98ff9
+
+
+
diff --git a/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6fa5116ef6f71777461dedc04145e9ca71f3b92
--- /dev/null
+++ b/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447373
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59ab0c90-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fb59860f287ba5dcb026ab5cdd04e00464ce77e
--- /dev/null
+++ b/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.64
+ 100.64.96.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.203
+ USER-0015-2148.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.83
+ 100.64.47.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.43.217
+ 100.64.43.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.105
+ 100.64.17.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.255
+ 100.64.93.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.58.223
+ 100.64.58.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.72.89
+ 100.64.72.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.237
+ 100.64.44.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.65
+ 100.64.96.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.186
+ 100.64.48.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.66
+ 100.64.96.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.245
+ 100.64.65.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.67
+ 100.64.96.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.31.60
+ 100.64.31.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.68
+ 100.64.96.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.157
+ USER-0015-2038.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.69
+ 100.64.96.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+ INCIDENT_LINK
+ 1709912497
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59adcd00-dd62-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26774b28253997b51e269553c71c7b01364b0753
--- /dev/null
+++ b/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744800
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59b40f20-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c64ec25e707c8f09117338f8280cf46c6dc7ce81
--- /dev/null
+++ b/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.42
+ 100.64.59.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831253
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59c44b10-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25a7828af9cbb7fa8691b819c1235f1261cee087
--- /dev/null
+++ b/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.107.86
+ 172.16.107.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.162
+ 100.64.91.162
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.163
+ 100.64.91.163
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59cee030-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59cee030-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59cee030-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59cee030-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cc3510b7869caa4cacb63d45942a5f438a0952c
--- /dev/null
+++ b/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.42
+ 100.64.59.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831253
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59d62560-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dff6c83526eac0421b6965ced558d67bb0f24c23
--- /dev/null
+++ b/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.43
+ 100.64.23.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447373
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 59d74cb0-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..030a72c7c2ef133e9c21e803a9ce914f67cd4ab1
--- /dev/null
+++ b/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.165
+ 100.64.33.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687561488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59da9150-121a-11ee-a890-99c329874409
+
+
+
diff --git a/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2db3b1e7eb10bcc475c4b554a7824c7c03a8426b
--- /dev/null
+++ b/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,793 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.116
+ 100.64.43.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.117
+ 100.64.43.117
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.118
+ 100.64.43.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.119
+ 100.64.43.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.93
+ 100.64.33.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.115
+ 100.64.33.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.169
+ 100.64.26.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.120
+ 100.64.43.120
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.121
+ 100.64.43.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.123
+ 100.64.43.123
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 59dc6a50-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a7a6300996441a6d3c179d26835c2f55a099790
--- /dev/null
+++ b/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.3
+ 100.64.44.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59e1ab70-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a110e0020eada1c2b9961b90b46e3eddb55fc6d
--- /dev/null
+++ b/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.165
+ 100.64.33.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687561488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59e93750-121a-11ee-a890-99c329874409
+
+
+
diff --git a/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb290789652dfc945e40ebddfc4f0884fbddd1c2
--- /dev/null
+++ b/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.3
+ 100.64.44.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458755
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 59efdc40-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..881848842b7dbcb1434960c512a160fe3c983b7a
--- /dev/null
+++ b/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.51
+ 100.64.23.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686447373
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 59f0ef30-07f8-11ee-8547-1367d9432c3e
+
+
+
diff --git a/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f712da7f3113695021a82d6ebefb4af9190bfd5
--- /dev/null
+++ b/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.237
+ 100.64.44.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 59fe1310-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b272eb94eb99aaabdc929f0606c901170f2940a
--- /dev/null
+++ b/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.35
+ 100.64.44.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005830
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a04cde0-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc8e8c6aa83b40b4c5c0ce988a25305d476757a5
--- /dev/null
+++ b/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,81 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ FILE
+ ["Phishing Email","Malicious File"]
+ 0.90625
+ ["ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.57
+ 100.64.68.57
+ ["Phishing Site","Exploiting Target"]
+ 0.947265625
+ ["Precinct","ProofPoint Protect","PAN NGFW"]
+
+
+ FILE
+ ["Phishing Email","Malicious File"]
+ 0.90625
+ ["ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1687408158
+ malicious
+ 0.947265625
+ 0.947265625
+ Data Theft
+ ["T1566","T1204","T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Phishing Email","Malicious File","Phishing Site","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a0954b0-10b5-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408158
+ malicious
+ 0.947265625
+ 0.947265625
+ Data Theft
+ ["T1566","T1204","T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Phishing Email","Malicious File","Phishing Site","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a0954b0-10b5-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b5320ab0711081baccb50f2ef38827f5d7e1d6c
--- /dev/null
+++ b/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.241
+ 100.64.44.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a0fc650-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adc2cf3d70d7d54a553a781bd8be8f6c69a8d742
--- /dev/null
+++ b/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.18.41
+ 100.64.18.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696189218
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a1177d0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189218
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a1177d0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189218
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a1177d0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189218
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a1177d0-6092-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63518bcd745ccdb4082237a588049e45b029fc59
--- /dev/null
+++ b/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.180
+ 100.64.51.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a1342c0-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34e99a199e91e272f729ebc66979b2bfcbd0bcb9
--- /dev/null
+++ b/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.35
+ 100.64.44.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a1b3c10-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml b/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1070bfe4761933b9c483ed6d685d49004699b9f
--- /dev/null
+++ b/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.150
+ 100.64.77.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659548852
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a213620-1354-11ed-8dba-c3c980000fe0
+
+
+
diff --git a/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0124d7956d03239d1eb3b6356b2baa4f44fccd01
--- /dev/null
+++ b/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.180
+ 100.64.51.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458755
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a228500-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdfc345f62ffe20cb0379673260221126e16b833
--- /dev/null
+++ b/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.183
+ 100.64.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.94
+ 100.64.57.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.95
+ 100.64.57.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.67
+ 100.64.7.67
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.96
+ 100.64.57.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a277d20-0938-11ee-a886-17db84346526
+
+
+
diff --git a/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abe7958f8c928372443a47115c3840893a677753
--- /dev/null
+++ b/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.163
+ 100.64.70.163
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.164
+ 100.64.70.164
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713797725
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a279260-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797725
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a279260-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797725
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a279260-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797725
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a279260-00b8-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cabc002a5fccab6358867f08c2a127b327188893
--- /dev/null
+++ b/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.241
+ 100.64.44.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908362
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a280940-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7cd9ac340e2364b04ebdd6ba0b91c59d1d18008
--- /dev/null
+++ b/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.48
+ 100.64.18.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032750
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a2cca90-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29e197b4cdf2ff1adab16659a6961d600838acd3
--- /dev/null
+++ b/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.184
+ 100.64.51.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a30b5d0-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcf5253616ad6dc00d00f8d22deb07128dc40d2a
--- /dev/null
+++ b/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.98
+ 100.64.21.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ 100.64.71.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.129
+ 100.64.82.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670151409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a358520-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a358520-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a358520-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a358520-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65016dcd221474418703dcd3bd6c7724750468c0
--- /dev/null
+++ b/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.184
+ 100.64.51.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a3f0db0-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37205c214c94ce07e3eb5a0b19ade081171fe5cc
--- /dev/null
+++ b/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.197
+ 100.64.56.197
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546865
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a484720-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68f6151a7cc52da648b58cee2b696da0c31acd0a
--- /dev/null
+++ b/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.186
+ 100.64.51.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a4aa670-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55e284eb9b213bb0b64d2d8d6c11df3868cc5f7a
--- /dev/null
+++ b/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841264
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a520180-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28c2c662d00df58ac45728cadf7c223972bed4c3
--- /dev/null
+++ b/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a578dc0-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87f8c9957662da6fcbc0a66193eece334f080971
--- /dev/null
+++ b/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.186
+ 100.64.51.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717458756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a57c5d0-2204-11ef-b592-0939f15f5fe2
+
+
+
diff --git a/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8010b3b1d2db7974e7dc8e145502060aa106b1f5
--- /dev/null
+++ b/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.159
+ 100.64.62.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702596881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a59f650-9ad9-11ee-a153-0bcaae5115e2
+
+
+
diff --git a/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d545a4ed186157ce8853612c9e7ac3ca1d539704
--- /dev/null
+++ b/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.105
+ 100.64.28.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6344226de7032c95f193cc40ede03f1c1247bf2f
--- /dev/null
+++ b/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.7
+ 100.64.83.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662137000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a638010-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662137000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a638010-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..615cc1a473441574013c775ed75a03b011ddf6ec
--- /dev/null
+++ b/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.63
+ 100.64.5.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a6ae290-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae2bf55e30a13c2249520fc4358f71ade00f140b
--- /dev/null
+++ b/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.197
+ 100.64.27.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..396f300cf188560bdaf377ad53f59572ecc4cf1f
--- /dev/null
+++ b/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.63
+ 100.64.5.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a7d3210-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0a725f0dd3af0cd6ce031c6e69e237d6391d9de
--- /dev/null
+++ b/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.60
+ 100.64.69.60
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.69.61
+ 100.64.69.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.31.69
+ 100.64.31.69
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334562
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a7f3240-ea51-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ec779f6228daf848dfcdc1cdc88ec3872132802
--- /dev/null
+++ b/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.102
+ 100.64.4.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7168e1438d479cfc4555f74bb48e43801edc0f4
--- /dev/null
+++ b/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a859150-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a859150-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac75e0a5947194290fc8905c2531008527b1a768
--- /dev/null
+++ b/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.132
+ 100.64.43.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a8c0b40-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e4049d740b949c089a04b46082631bc5b5ac599
--- /dev/null
+++ b/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.58
+ 100.64.41.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5a8cc270-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..157656cb839baaecf5b492ce3af90cff3cf05b6f
--- /dev/null
+++ b/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.102
+ 100.64.4.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d19d63293be538ced80ac06adc56aeabaf2e173
--- /dev/null
+++ b/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.197
+ 100.64.39.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714251704
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a8e3c20-04d9-11ef-9f37-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8f34ce4650f7af63e01a3554bda654177410031
--- /dev/null
+++ b/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.109
+ 100.64.85.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720774901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a9a1c90-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f0df1563220700f9e0fb4e7cf108525ef2889a3
--- /dev/null
+++ b/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.102
+ 100.64.24.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f11e463cc94139b643f6ad43e9f5154c6ed0622
--- /dev/null
+++ b/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.58
+ 100.64.41.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711858548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5a9e2790-ef15-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75be2b9d621e675bc5f73dfce4f65b0e447cd052
--- /dev/null
+++ b/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.178
+ 100.64.81.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.60
+ 100.64.73.60
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5aace870-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5aace870-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b12bad239e0a7d0ccff816b9e0d6caafe3ec93ff
--- /dev/null
+++ b/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.102
+ 100.64.24.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aae0440-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0b3c4e44ef72068944583ec61a7d472a87fb46a
--- /dev/null
+++ b/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.109
+ 100.64.85.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774901
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ab2d4b0-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..281a3c8c086fcbb77d6f112f5c0a42703ced22bb
--- /dev/null
+++ b/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.142
+ 100.64.20.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715871337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ab53f90-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98cce60f7b99afbdeb2a4e9f365d35304c6894ce
--- /dev/null
+++ b/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.179
+ 100.64.81.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ab68560-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ab68560-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ce767ec34cc0e9f8b806118082067df9cfe3ab3
--- /dev/null
+++ b/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.180
+ 100.64.81.180
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.109
+ 100.64.1.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5abacb20-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659286001
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5abacb20-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19367ba3337c57d9ead3f2619df5e359ef0aa549
--- /dev/null
+++ b/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.129
+ 100.64.59.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.130
+ 100.64.59.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720040461
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5abc62a0-397f-11ef-bdca-fd3640be1aae
+
+
+ INCIDENT_LINK
+ 1720040461
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5abc62a0-397f-11ef-bdca-fd3640be1aae
+
+
+ INCIDENT_LINK
+ 1720040461
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5abc62a0-397f-11ef-bdca-fd3640be1aae
+
+
+ INCIDENT_LINK
+ 1720040461
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5abc62a0-397f-11ef-bdca-fd3640be1aae
+
+
+
diff --git a/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cca0aef90f2327da0495e7c68e1464ff4cec0519
--- /dev/null
+++ b/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.200
+ 100.64.72.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.31
+ 100.64.77.31
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665761953
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761953
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761953
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761953
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfa3833069150b7a6d484f4a9f8030747aebb1cd
--- /dev/null
+++ b/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.132
+ 100.64.43.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011172
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ac5dff0-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..733327a043bff44bc31cd134fc127e81c2ca7b65
--- /dev/null
+++ b/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,351 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.82
+ 100.64.40.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.22
+ 100.64.43.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.23
+ 100.64.43.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.78
+ 100.64.30.78
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.103
+ 100.64.27.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.24
+ 100.64.43.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.25
+ 100.64.43.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.26
+ 100.64.43.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.233
+ 100.64.36.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299074
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ac7e160-85f3-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1a3e434f8f81065de49a1b041a3884d4eee3b1b
--- /dev/null
+++ b/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.137
+ 100.64.47.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ad0a6a0-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56426a06aa6693c9b1a32c220aa26468d90ea48f
--- /dev/null
+++ b/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.37
+ 100.64.47.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ad0b680-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae9d126ac69230848dc4373c7ebe9d543a47332b
--- /dev/null
+++ b/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.201
+ 100.64.26.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522973
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14b0b041e45b290415a9afa553e7cf5c5182ccba
--- /dev/null
+++ b/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.137
+ 100.64.47.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335249
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ae34440-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f3ab3027fad706149597498b0abba2b7109e5f4
--- /dev/null
+++ b/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.225
+ 100.64.60.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.226
+ 100.64.60.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.204
+ 100.64.56.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.227
+ 100.64.60.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.228
+ 100.64.60.228
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.229
+ 100.64.60.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.231
+ 100.64.26.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.64
+ 100.64.4.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.238
+ 100.64.19.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.183
+ 100.64.23.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+ INCIDENT_LINK
+ 1691456595
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2f37b61677ce47a651c81b8168abdd9480884ab
--- /dev/null
+++ b/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.203
+ 100.64.81.203
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.217
+ 100.64.74.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.235
+ 100.64.72.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae46760-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae46760-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae46760-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ae46760-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..583f4d4762eaf1f86c9e764d3290776087f2638f
--- /dev/null
+++ b/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.39
+ 100.64.47.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ae59e10-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ae59e10-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..399aed983b73fe8e74c2ae13967c163228334aa1
--- /dev/null
+++ b/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.201
+ 100.64.26.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699522973
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5aea4590-7ee4-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68b7850d692a6cd77ca602367a3ebb7e3f44b6cd
--- /dev/null
+++ b/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.204
+ 100.64.81.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.205
+ 100.64.81.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+ INCIDENT_LINK
+ 1661506070
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5aee2b60-2521-11ed-8e05-13976c823138
+
+
+
diff --git a/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..879054480db59e31969358d3b5ef068d384b5284
--- /dev/null
+++ b/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.165
+ 100.64.39.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5aee46f0-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c65d3264e9c50403229781f9445a234db9947572
--- /dev/null
+++ b/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.88
+ 100.64.43.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388375
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5af06470-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56312ab66edfbdc8091f81fcd983af0d1f867127
--- /dev/null
+++ b/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.73
+ 100.64.39.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797886
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5af3dab0-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..737bfd3f9250bb8bddc9672f8fcc84173b2a7bf6
--- /dev/null
+++ b/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.39
+ 100.64.47.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5af4e050-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97b10485ebeb755e9f1b08e9af6e2a226a7eee09
--- /dev/null
+++ b/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,133 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.142
+ 100.64.68.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1690805908
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 5afd7df0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805908
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 5afd7df0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805908
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 5afd7df0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805908
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 5afd7df0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805908
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 5afd7df0-2f9c-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..087c9a3b5eb6dc128b903af0f9319cae35cca375
--- /dev/null
+++ b/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.165
+ 100.64.39.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517487
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5aff0fd0-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e2759c721e900b025598951c4f8fe472cb9dedb
--- /dev/null
+++ b/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.88
+ 100.64.43.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388375
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b039e50-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5c0983f5fd7abb161b5c695807db8c1f14758bc
--- /dev/null
+++ b/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.73
+ 100.64.39.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702797886
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b062a30-9cad-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e2c5aba3c6807669665aaad950e60f968ba2e4b
--- /dev/null
+++ b/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.210
+ 100.64.75.210
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.211
+ 100.64.75.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664668884
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b069e30-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668884
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b069e30-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668884
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b069e30-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668884
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b069e30-41e5-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9392c822a9e74209e66a05cae5cdb00f84546f2e
--- /dev/null
+++ b/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b06dd30-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98c64e7e40c3d037247126c3237004b7ea2573c2
--- /dev/null
+++ b/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.167
+ 100.64.39.167
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695517487
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b0fffc0-5a76-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1346389e5ab7ac23778a203e268204638e188c63
--- /dev/null
+++ b/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.120
+ 100.64.41.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b16c600-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec714d8fa34df9590b45aada713dae2d5fbeb8f3
--- /dev/null
+++ b/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5b1c39f0-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58f72f70997e0465a92591dce788d221051e3431
--- /dev/null
+++ b/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.122
+ 100.64.8.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005832
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b213a60-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46700f33226e3caa6fe72be9dca1744ca0c43a04
--- /dev/null
+++ b/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710982
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b2ac6b0-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb858b34c874a175729e866ad87ae9667f0199c3
--- /dev/null
+++ b/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677710982
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5b2d37b0-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d38798315288f92c07fc936f7560500bd14c7293
--- /dev/null
+++ b/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.229
+ USER-0015-1354.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694745
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b2d8b90-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fa0265bed9170ad8331d5f400c63b0537d1d28e
--- /dev/null
+++ b/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710982
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b315660-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d2ec12ba47333fa5c0821ae64e95c26c0c96364
--- /dev/null
+++ b/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.214
+ USER-0015-1389.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721196667
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b39f3d0-4403-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26aadd662bc5c38fee83c348f9c7321b44042c08
--- /dev/null
+++ b/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689312119
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b3b5fb0-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4b30c106b7996a4bcaa4f9c8a5f0bc4ff47f67a
--- /dev/null
+++ b/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.4
+ 100.64.16.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738678
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b3bada0-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f28033bafef8d354ea546d706a9769703f3e21aa
--- /dev/null
+++ b/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388375
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9195e4ea5545e74cf0c263e8596202ffc650066
--- /dev/null
+++ b/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.229
+ USER-0015-1354.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709694745
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b400220-db67-11ee-9e15-db3d7bd62dd4
+
+
+
diff --git a/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c370b45501d2b95c2d18429baa0c4c5821079076
--- /dev/null
+++ b/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.141
+ 100.64.22.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b431780-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afbc4980a04dfd40f5d115bb7c984b8630a7b258
--- /dev/null
+++ b/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.163
+ 100.64.68.163
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690210196
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b43d400-2a31-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210196
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b43d400-2a31-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..261c6c5beabb79c03a8b16427144078a3de09b86
--- /dev/null
+++ b/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.90
+ 100.64.43.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697388375
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47
+
+
+
diff --git a/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..922507f12812670f35ecd9ea081ef256e3ed714b
--- /dev/null
+++ b/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.6
+ 100.64.16.6
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738678
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b4ec070-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9cc7001f95f4848d16bd8bbb0c72ec119b27ae4
--- /dev/null
+++ b/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.120
+ 100.64.41.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672896
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b4fb050-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cc439521853b297e85768a06bcfdda478424d66
--- /dev/null
+++ b/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.141
+ 100.64.22.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335249
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b545590-61e6-11ee-b713-27a48af32cd1
+
+
+