diff --git a/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdacf51ca258ddc659e8c7bc88c215f54b0202f6 --- /dev/null +++ b/graph/incidents_graphml/5/52123240-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.38 + 100.64.37.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52123240-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..842a90d6c5bda9073441c5862ff6e0fe23260462 --- /dev/null +++ b/graph/incidents_graphml/5/5212cd80-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.170 + 100.64.91.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5212cd80-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7167a26636214ead79b0312f5cbbe1e551419f2a --- /dev/null +++ b/graph/incidents_graphml/5/521475d0-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.21 + 100.64.62.21 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 521475d0-6a4e-11ee-a1cb-53f21743b64f + + + INCIDENT_LINK + 1697259511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 521475d0-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c36ed4ed9cd46eb32f6c2a8079af1537c97dd16d --- /dev/null +++ b/graph/incidents_graphml/5/521e9e20-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.54 + 100.64.75.54 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.228 + 100.64.82.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687776223 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 521e9e20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776223 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 521e9e20-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..173539babc53b5347ae144a9e4609b3836efe859 --- /dev/null +++ b/graph/incidents_graphml/5/521eb840-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.51 + 100.64.47.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101491 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 521eb840-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..632dc3dda93a9138e3a4fc53f82e6049643556cf --- /dev/null +++ b/graph/incidents_graphml/5/522236d0-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.91.170 + 100.64.91.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 522236d0-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb2cd50327fd3c77072bb08d89f8cf40f8605548 --- /dev/null +++ b/graph/incidents_graphml/5/522bfbd0-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.36 + 100.64.37.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 522bfbd0-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a299c78bffb69d23361e4a8b0c5574fc9ae0fbf9 --- /dev/null +++ b/graph/incidents_graphml/5/522df850-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1689357630 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 522df850-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2f24f9332a3f0a0d66e2763a56341094c3ad78f --- /dev/null +++ b/graph/incidents_graphml/5/522fa450-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.173 + 100.64.91.173 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 522fa450-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58c13f877aafd09e7a251679405d232ceac6e7b8 --- /dev/null +++ b/graph/incidents_graphml/5/523110f0-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.192 + 100.64.94.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677526284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 523110f0-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17783227d44a125697c4564a53668bb8a6aa4109 --- /dev/null +++ b/graph/incidents_graphml/5/52331080-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.40 + 100.64.1.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.48.19 + 100.64.48.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776223 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 52331080-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776223 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 52331080-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b4dc724a0a19ac1ea3eaf331fe773704c13a7c9 --- /dev/null +++ b/graph/incidents_graphml/5/5234e660-0b81-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.87.242 + 100.64.87.242 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.163 + 100.64.94.163 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714983553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5234e660-0b81-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5234e660-0b81-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5234e660-0b81-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5234e660-0b81-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d22956627d7c3e2cf44b18dbfd1572c17f3baeb5 --- /dev/null +++ b/graph/incidents_graphml/5/523e9870-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.173 + 100.64.91.173 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 523e9870-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbcb9b5c08d56e035ed8b63c066d306d01f2272e --- /dev/null +++ b/graph/incidents_graphml/5/52483710-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689357630 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52483710-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed14e74ef50b06734e1d9206b801716c2e3b90bb --- /dev/null +++ b/graph/incidents_graphml/5/52545530-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.190 + 100.64.20.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424736 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52545530-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6026b65119e5db7ea99ff9e1750c15759221aa98 --- /dev/null +++ b/graph/incidents_graphml/5/52585850-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1714073879 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52585850-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9fbc31bc05a181f89ecfded61a106fad1f7cc67 --- /dev/null +++ b/graph/incidents_graphml/5/5260fed0-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.151 + 100.64.80.151 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660796098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5260fed0-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f4d527e24d622bc4571a0b0b5ebcd4e46857830 --- /dev/null +++ b/graph/incidents_graphml/5/5263be80-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.190 + 100.64.20.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5263be80-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..605d526e957329a355ab77148e37b4b121e8b163 --- /dev/null +++ b/graph/incidents_graphml/5/5264a300-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.199 + USER-0015-1270.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473560 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5264a300-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4555b9f8b4d105062efb83a9cdd05c81fc07b72b --- /dev/null +++ b/graph/incidents_graphml/5/5268ee10-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.151 + 100.64.80.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660796098 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5268ee10-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccd57102ec26de5b8255aebf08034e620b424c20 --- /dev/null +++ b/graph/incidents_graphml/5/526f6c70-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.175 + 100.64.91.175 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 526f6c70-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a50f49dc7466b58fd64c83765fcd82dc8198c37c --- /dev/null +++ b/graph/incidents_graphml/5/5273e610-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.206 + 100.64.14.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443973 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5273e610-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26c93000863d9777983a09bc8cdc101da63c4d93 --- /dev/null +++ b/graph/incidents_graphml/5/528179d0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.199 + USER-0015-1270.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473560 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 528179d0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2b18045fdf2829edb203ef1709c4c4669244a76 --- /dev/null +++ b/graph/incidents_graphml/5/5284aef0-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.206 + 100.64.14.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443974 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5284aef0-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0d5c5e40425578223b6dd6ae0d9f2461311d7ec --- /dev/null +++ b/graph/incidents_graphml/5/528d02a0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.149 + 100.64.47.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518034 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 528d02a0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ff4dab58eb4235fde0d26573eb6af1a2921d926 --- /dev/null +++ b/graph/incidents_graphml/5/528ef210-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.38 + 100.64.65.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528120 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 528ef210-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03892a6b49f9879c765493a5ef3c660225cad482 --- /dev/null +++ b/graph/incidents_graphml/5/52943f50-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.39 + 100.64.15.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52943f50-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0fee60a2dbb96514152684013ed343e82268119 --- /dev/null +++ b/graph/incidents_graphml/5/52a0f370-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.38 + 100.64.65.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52a0f370-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e72db79bb3e49df28aca0de8252637f4ae84489 --- /dev/null +++ b/graph/incidents_graphml/5/52a35f00-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.155 + 100.64.80.155 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660796098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52a35f00-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..747cf654468b677652bc83c873c984ff75144dc7 --- /dev/null +++ b/graph/incidents_graphml/5/52aac3d0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.238 + 100.64.52.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518034 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52aac3d0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83b658e55ba03a6b7675f64071b0a4c71ecf598e --- /dev/null +++ b/graph/incidents_graphml/5/52aae440-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.62.242 + USER-0015-1521.example.internal + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.125 + 100.64.69.125 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214179 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52aae440-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d72cd2fb67d2a4251aab0dfa25f904292e6eee57 --- /dev/null +++ b/graph/incidents_graphml/5/52adb1d0-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.38 + 100.64.11.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101492 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52adb1d0-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0aca5bce8e35f4b59776f1460843622bb667c2eb --- /dev/null +++ b/graph/incidents_graphml/5/52ade530-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.201 + 100.64.76.201 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.51.2 + 100.64.51.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661506056 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52ade530-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506056 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52ade530-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e4a707747b2f0ba581f14594bfaf78eba9a226a --- /dev/null +++ b/graph/incidents_graphml/5/52ae0d60-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.155 + 100.64.80.155 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660796098 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52ae0d60-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb6c0b16b7007e6d7df90753363b90e43559235d --- /dev/null +++ b/graph/incidents_graphml/5/52b68860-ba69-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.56 + 100.64.83.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677919704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52b68860-ba69-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..caa8bb2e2b7f07cc66d63ca71edd1afe85b0b39d --- /dev/null +++ b/graph/incidents_graphml/5/52be0580-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.38 + 100.64.11.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101492 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 52be0580-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47849d36da1cdfdfc94816f5388d6655bd659ac1 --- /dev/null +++ b/graph/incidents_graphml/5/52c43f40-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.238 + 100.64.52.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518034 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 52c43f40-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31a9dc54b3d3cc553720e6ca026b898028f13697 --- /dev/null +++ b/graph/incidents_graphml/5/52cad6c0-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.55 + 100.64.47.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101492 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 52cad6c0-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b61d4a82ea5d7e7b41173ae390fbcfad482384f --- /dev/null +++ b/graph/incidents_graphml/5/52d85c60-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.177 + 100.64.81.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659285988 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52d85c60-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659285988 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52d85c60-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4344ad5ececa10244a66fc41d68007225f9f4937 --- /dev/null +++ b/graph/incidents_graphml/5/52d8e080-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.55 + 100.64.47.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101492 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52d8e080-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..096b76f4cef950d5d13cb1f7e6787ec8c7093d8d --- /dev/null +++ b/graph/incidents_graphml/5/52e5bf30-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.157 + 100.64.80.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.158 + 100.64.80.158 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660796099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52e5bf30-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e238853954fdb29ef23f9943faef92ba36b155af --- /dev/null +++ b/graph/incidents_graphml/5/52e822c0-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.129 + 100.64.37.129 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101492 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52e822c0-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cfb8effdd54789e99786b3f5ab7af4e5c8aa4ce --- /dev/null +++ b/graph/incidents_graphml/5/52fd4960-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,645 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.43 + 100.64.38.43 + ["Exploiting Host"] + 0.4375 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.192 + USER-0015-2050.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.193 + 100.64.90.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.194 + 100.64.90.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.195 + 100.64.90.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.196 + USER-0015-2051.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.55 + 100.64.5.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.12.90 + 100.64.12.90 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.178 + 100.64.86.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.197 + USER-0015-2052.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.106 + 100.64.28.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 52fd4960-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7edf4bb42713da4772ded59b642db229f1af01a --- /dev/null +++ b/graph/incidents_graphml/5/53325c50-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.41 + 100.64.35.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131488 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53325c50-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a359e4fb477c9c698a633fa81208fd5bb0c1dbdb --- /dev/null +++ b/graph/incidents_graphml/5/5340b430-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5340b430-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b448e70a91aeb8e727c0f3d53df7f70ee90531ad --- /dev/null +++ b/graph/incidents_graphml/5/53494680-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.110 + 100.64.4.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.204 + 100.64.90.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.192 + 100.64.19.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.192 + 100.64.63.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.190 + 100.64.42.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.205 + 100.64.90.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.206 + 100.64.90.206 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389200 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53494680-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b2f852aa099e7c611ddc2c829fffc330ce521c5 --- /dev/null +++ b/graph/incidents_graphml/5/534bacf0-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.104 + 100.64.77.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.56 + 100.64.76.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660796099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 534bacf0-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 534bacf0-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 534bacf0-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 534bacf0-1eac-11ed-b576-2ddb0d65fe5a + + + INCIDENT_LINK + 1660796099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 534bacf0-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c301f475ec3ff301da5055719d71767f9d6962d --- /dev/null +++ b/graph/incidents_graphml/5/5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131488 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5350b9c0-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml b/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d6aa600cd9deba3ffeb690d652cafbc3a308721 --- /dev/null +++ b/graph/incidents_graphml/5/53565b50-1eac-11ed-b576-2ddb0d65fe5a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.84 + 100.64.76.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660796099 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53565b50-1eac-11ed-b576-2ddb0d65fe5a + + + diff --git a/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50957ea319113f9d4f17930cf9e83a75587d26f4 --- /dev/null +++ b/graph/incidents_graphml/5/535ad6a0-3f5b-11ee-a7a8-a9c952ce7042.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.241 + 100.64.69.241 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692537196 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 535ad6a0-3f5b-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537196 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 535ad6a0-3f5b-11ee-a7a8-a9c952ce7042 + + + diff --git a/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8edbb13678a475a4c10bed540a81b7d108d6c95 --- /dev/null +++ b/graph/incidents_graphml/5/5364dda0-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661350580 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5364dda0-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..982029668715a7b4b7162898c96f3e31bd054ab6 --- /dev/null +++ b/graph/incidents_graphml/5/536986a0-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.175 + 100.64.16.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 536986a0-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 536986a0-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64d6702acc267a973d263b4717a7a8f08737ba51 --- /dev/null +++ b/graph/incidents_graphml/5/536b4640-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661350580 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 536b4640-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62cd0456e610b35dd83f6302d25f5b4779d10ceb --- /dev/null +++ b/graph/incidents_graphml/5/536f16d0-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.181 + 100.64.85.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661350580 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 536f16d0-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..097b514b315f996376f691447d1284fdd4428bf0 --- /dev/null +++ b/graph/incidents_graphml/5/53741fe0-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.85.181 + 100.64.85.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661350580 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53741fe0-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac051cfa93f71bc8c33da08baec207d3b716b11e --- /dev/null +++ b/graph/incidents_graphml/5/537c5af0-df15-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.81 + 100.64.10.81 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099318 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 537c5af0-df15-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2b7e4ff3c554dbcbeabac17acdae2a9351d3c23 --- /dev/null +++ b/graph/incidents_graphml/5/537c92c0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.238 + 100.64.52.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 537c92c0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84d7f68ba690050003fee9a9aab431e24bde1d41 --- /dev/null +++ b/graph/incidents_graphml/5/537de250-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.200 + 100.64.71.200 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 537de250-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..622b0a474b3be2978dcd39e043117d93c42e749d --- /dev/null +++ b/graph/incidents_graphml/5/5388ef10-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.62 + 100.64.21.62 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693912875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5388ef10-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f5b2ca7006ef3a67215b52a0b344dd1ad359dd2 --- /dev/null +++ b/graph/incidents_graphml/5/538e5c50-df15-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.81 + 100.64.10.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099318 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 538e5c50-df15-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..070733d512890febbc72437db27196d1ebd36e73 --- /dev/null +++ b/graph/incidents_graphml/5/538ed240-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.200 + 100.64.71.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272128 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 538ed240-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef003247ffe037c6c186019c8d446212c443efad --- /dev/null +++ b/graph/incidents_graphml/5/53962e80-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.188 + 100.64.79.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.79.189 + 100.64.79.189 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1678376690 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53962e80-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376690 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53962e80-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376690 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53962e80-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376690 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53962e80-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d388c1b40a6890b38e115b365c5f86213e4ecae --- /dev/null +++ b/graph/incidents_graphml/5/53999450-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.95 + 100.64.60.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 53999450-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de8aa04aa69c899f58a701b12367fffb567a8360 --- /dev/null +++ b/graph/incidents_graphml/5/539c28f0-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.21.62 + 100.64.21.62 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693912875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 539c28f0-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12facc042e96af454eccd3281fec9186a1de055f --- /dev/null +++ b/graph/incidents_graphml/5/539d5ff0-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.20 + 100.64.49.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570372 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 539d5ff0-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a51fa3ca1e54a457aedb2c8d15fa288654a6c2cf --- /dev/null +++ b/graph/incidents_graphml/5/539fb500-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.247.211 + 192.168.247.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.77.41 + 100.64.77.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689002009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 539fb500-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689002009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 539fb500-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1879644b1f6196e5b3f9baea026253b586dd3e3c --- /dev/null +++ b/graph/incidents_graphml/5/53a6bfb0-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.14 + 100.64.83.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013952 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53a6bfb0-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013952 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53a6bfb0-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4fbc9c040aaa577b29ede990b2ca16807e022ee --- /dev/null +++ b/graph/incidents_graphml/5/53a7dcc0-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.105 + 100.64.58.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53a7dcc0-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53a7dcc0-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e16ac314704e8c4b1f524112baa0ad3fcc8930dd --- /dev/null +++ b/graph/incidents_graphml/5/53af1460-39b9-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.43 + 100.64.97.43 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1691917863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53af1460-39b9-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39318d3f929c03165e6581c0c55abd1c94c3a902 --- /dev/null +++ b/graph/incidents_graphml/5/53b09350-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.44.135 + 100.64.44.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684823865 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53b09350-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fd7067441c937003643f82e41e0b60609bb5e03 --- /dev/null +++ b/graph/incidents_graphml/5/53b63060-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.200 + 100.64.77.200 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53b63060-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cc51ef135523e15f2f4c23828c80c27128480f8 --- /dev/null +++ b/graph/incidents_graphml/5/53b70e50-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.114 + 100.64.16.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53b70e50-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53b70e50-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c06b1add489fe31bc21e2ed790a5e565d645cc9a --- /dev/null +++ b/graph/incidents_graphml/5/53b95d90-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.143 + 100.64.58.143 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53b95d90-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7716f08d596a2dea8c3db463ad01c55fcd7d315c --- /dev/null +++ b/graph/incidents_graphml/5/53cd88f0-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.200 + 100.64.77.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272128 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53cd88f0-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ba6134620a59455b36fabe9be97a48ffadefc7b --- /dev/null +++ b/graph/incidents_graphml/5/53d380a0-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.105 + 100.64.58.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53d380a0-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee37306a316ab0c846af428faeb4117d3d1be1dd --- /dev/null +++ b/graph/incidents_graphml/5/53d38c50-39b9-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.43 + 100.64.97.43 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53d38c50-39b9-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f9a203ee48164e171eba4e1ab06ca15c5df875d --- /dev/null +++ b/graph/incidents_graphml/5/53d80920-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.143 + 100.64.58.143 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473562 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53d80920-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39135ce9507bee28fa9b96f0bdee8e05b15855e0 --- /dev/null +++ b/graph/incidents_graphml/5/53df5290-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.15 + 100.64.79.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.86 + 100.64.73.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.109 + USER-0015-1627.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208944 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53df5290-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c064c1f0c16983ae8ebde6c7f5e6c5c573ae7e29 --- /dev/null +++ b/graph/incidents_graphml/5/53e3a900-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.132 + 100.64.73.132 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53e3a900-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ca0477b0cdc2616e630af189150f19c69fb3155 --- /dev/null +++ b/graph/incidents_graphml/5/53e3e7e0-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.57 + 100.64.47.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101494 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53e3e7e0-8427-11ee-aad5-255bef0b512c + + + INCIDENT_LINK + 1700101494 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53e3e7e0-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5327e13b36cd75e416a7531ef398f13d0a36de25 --- /dev/null +++ b/graph/incidents_graphml/5/53eb4b60-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.153 + 100.64.73.153 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53eb4b60-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..414803330f72e400b17a2ac79108a01a97cd66b6 --- /dev/null +++ b/graph/incidents_graphml/5/53f08710-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.208 + 100.64.3.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321625 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53f08710-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a6c72be69c8bb7fc66d489bf8511ba983e2b39c --- /dev/null +++ b/graph/incidents_graphml/5/53f35130-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.57 + 100.64.47.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101494 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 53f35130-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df0368d8d0853e34d8caeed52ef4f93dc93cdb41 --- /dev/null +++ b/graph/incidents_graphml/5/53f80490-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.186 + 100.64.92.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693912875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 53f80490-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5934533c0d238c942ed7cecd38f76728e6481cbd --- /dev/null +++ b/graph/incidents_graphml/5/53fb7800-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.153 + 100.64.73.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 53fb7800-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecab62b179e03e2afbf29f0d87f53c2fd72d4f20 --- /dev/null +++ b/graph/incidents_graphml/5/53fd6120-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.136 + 100.64.91.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689357633 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 53fd6120-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..027458da48cfc685ce689cf422d9202a1d226262 --- /dev/null +++ b/graph/incidents_graphml/5/53fe5880-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.118 + 100.64.22.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53fe5880-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d530018e63c9b05439015e05e688ee47ce4dc9ca --- /dev/null +++ b/graph/incidents_graphml/5/53feb7e0-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.208 + 100.64.3.208 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321625 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 53feb7e0-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0445e1932495c4e44384b1f82341ab5c99870de7 --- /dev/null +++ b/graph/incidents_graphml/5/53ffd450-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.59 + 100.64.47.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101494 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 53ffd450-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..736e89e06d37b8585351a88c851b6ed87f718df1 --- /dev/null +++ b/graph/incidents_graphml/5/5400c6d0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.145 + 100.64.58.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5400c6d0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddea684b2ecb8f77e22eacf88c787532783467c1 --- /dev/null +++ b/graph/incidents_graphml/5/54053ac0-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.132 + 100.64.73.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54053ac0-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9778e82881a68a018ebb5a9c82621336239d7fbc --- /dev/null +++ b/graph/incidents_graphml/5/540a4510-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.247 + 100.64.75.247 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 540a4510-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d92d245db0a05855191af7229898ff991120bbb5 --- /dev/null +++ b/graph/incidents_graphml/5/540e5340-8427-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.59 + 100.64.47.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700101494 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 540e5340-8427-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a151f1d30f240236984029de1deb4fe2f48c7e67 --- /dev/null +++ b/graph/incidents_graphml/5/540eb8e0-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.137 + 100.64.44.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684823866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 540eb8e0-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2438cecd1b898da8365da877bddb9d3126d81795 --- /dev/null +++ b/graph/incidents_graphml/5/540f6f80-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.118 + 100.64.22.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871325 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 540f6f80-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9521f27f0b9da89c2e245921c454e108608ce517 --- /dev/null +++ b/graph/incidents_graphml/5/54108fa0-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.161.240.76 + USER-0015-1582.example.internal + ["Exploiting Host"] + 0.841796875 + ["Precinct","Vulnerability Management","PAN NGFW"] + + + HOST + 100.64.70.99 + 100.64.70.99 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.100 + USER-0015-1583.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.101 + USER-0015-1584.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.102 + USER-0015-1585.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.103 + 100.64.70.103 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.104 + 100.64.70.104 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.105 + 100.64.70.105 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073882 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54108fa0-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7504fd3fb2e9dda8506bf9b87b7faf248b01018 --- /dev/null +++ b/graph/incidents_graphml/5/54193930-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.35 + 100.64.71.35 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54193930-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e82a5d282b31c45b9ef62ac490d2fb20c438d2bd --- /dev/null +++ b/graph/incidents_graphml/5/541c2300-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.163 + 100.64.7.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 541c2300-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b1c0318da6661545e4c2f66f6ccdd89156b55fd --- /dev/null +++ b/graph/incidents_graphml/5/541f5270-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.74 + 100.64.76.74 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 541f5270-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3990df41a0f227c3a14d831a3fa86201d576d093 --- /dev/null +++ b/graph/incidents_graphml/5/54293660-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.145 + 100.64.58.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473563 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54293660-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..193e0f2249211bfbd73449f10704bba6191227fa --- /dev/null +++ b/graph/incidents_graphml/5/54296670-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.104 + 100.64.30.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699478 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54296670-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699478 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54296670-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699478 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54296670-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699478 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54296670-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ce3721a3be48bbdcd30683929a2c62e9503737e --- /dev/null +++ b/graph/incidents_graphml/5/542a5730-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.44.137 + 100.64.44.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684823866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 542a5730-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a578e717540aaed689809a6dcc510a43135740f --- /dev/null +++ b/graph/incidents_graphml/5/542bd6d0-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.35 + 100.64.71.35 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 542bd6d0-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d73b27d52804c0adac1e64d9393944ec9a4790ca --- /dev/null +++ b/graph/incidents_graphml/5/5432a1f0-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.136 + 100.64.91.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689357634 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5432a1f0-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70a24ce13b7f515f5d505999f6831d2006ce5861 --- /dev/null +++ b/graph/incidents_graphml/5/5432b840-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.163 + 100.64.7.163 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416869 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5432b840-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92c43f7b08be9b00bed99787b6491765e9f02934 --- /dev/null +++ b/graph/incidents_graphml/5/5434e9f0-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.39 + 100.64.17.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052705 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5434e9f0-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6d6e15d10251be0b0cf29a0c2235a09cc6aba2b --- /dev/null +++ b/graph/incidents_graphml/5/5439b840-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.74 + 100.64.76.74 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5439b840-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04c3465ed7117ae9d562a0b03b2dc2c8a0c7c149 --- /dev/null +++ b/graph/incidents_graphml/5/543bb550-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.249 + 100.64.75.249 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 543bb550-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5fc992f7927e8ed68b066a629cf82c2ea7ebd073 --- /dev/null +++ b/graph/incidents_graphml/5/5442d9e0-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.13.93 + 100.64.13.93 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595644 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595644 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595644 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595644 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5442d9e0-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3886da40550f29759b613671ec6df7d81e26ec87 --- /dev/null +++ b/graph/incidents_graphml/5/54437500-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.235 + 100.64.23.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54437500-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f3d069edee6d371e3a37c01ef079a3f5860737b --- /dev/null +++ b/graph/incidents_graphml/5/54472150-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871326 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54472150-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa2f6207ea6af7adbe341c5badccc57d339dd4b9 --- /dev/null +++ b/graph/incidents_graphml/5/54480ee0-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.192 + 100.64.20.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424739 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54480ee0-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69f6ec808b459d7887c37272f1a6a5d41f780de6 --- /dev/null +++ b/graph/incidents_graphml/5/54507490-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54507490-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04727ad9cab9adf0947d75f9c45f2259234892b5 --- /dev/null +++ b/graph/incidents_graphml/5/545307c0-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018144 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 545307c0-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0063b3afc473940342e91beb94a8cc3c4773c54e --- /dev/null +++ b/graph/incidents_graphml/5/545afd20-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.249 + 100.64.75.249 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 545afd20-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fbb0d473eed484f6f30f51f0f3d020d6d47cc8a --- /dev/null +++ b/graph/incidents_graphml/5/545fd970-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871326 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 545fd970-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6830c3ea4a5f92e27347aafcc618e215293ef801 --- /dev/null +++ b/graph/incidents_graphml/5/54613c30-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.192 + 100.64.20.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54613c30-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1760887e326582067c4f22d906e006cc2a5552e --- /dev/null +++ b/graph/incidents_graphml/5/5467c840-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018145 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5467c840-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7b38487cb83d494550b9ecbf29c942addb58319 --- /dev/null +++ b/graph/incidents_graphml/5/546b5680-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.150 + 100.64.79.150 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.37 + 100.64.29.37 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686591675 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 546b5680-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591675 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 546b5680-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591675 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 546b5680-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591675 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 546b5680-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4456da0d7ba39ef0c12e95cb5fadd96240fbec1e --- /dev/null +++ b/graph/incidents_graphml/5/546e3150-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.119 + 100.64.59.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871326 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 546e3150-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml b/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a595b68229d785accfd985585961117d70965a1 --- /dev/null +++ b/graph/incidents_graphml/5/5474c570-0660-11ee-8e53-6f51e8fa7a6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686272129 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5474c570-0660-11ee-8e53-6f51e8fa7a6b + + + diff --git a/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69532a763b5a4415093c17b0973b01a77b1e5e66 --- /dev/null +++ b/graph/incidents_graphml/5/547894c0-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.194 + 100.64.20.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424739 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 547894c0-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b1a032b3fdd3ff1a6eeeadb091a129240dc2025 --- /dev/null +++ b/graph/incidents_graphml/5/5478bc50-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.174 + 100.64.80.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5478bc50-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5478bc50-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00a1d046b8872145397643259f87c78337709f35 --- /dev/null +++ b/graph/incidents_graphml/5/548195f0-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.175 + 100.64.80.175 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 548195f0-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 548195f0-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..134813fd604b009652b9f1b5fd73ca322ad8910b --- /dev/null +++ b/graph/incidents_graphml/5/54887340-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.194 + 100.64.20.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424740 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54887340-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbf6bd8269cfacaa34b5d3f957acdbf90b748576 --- /dev/null +++ b/graph/incidents_graphml/5/548a4a80-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.251 + 100.64.75.251 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 548a4a80-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..484ea9570a16fffbc32fc32243db4611aff14944 --- /dev/null +++ b/graph/incidents_graphml/5/548ec650-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.227 + 100.64.93.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693912876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 548ec650-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml new file mode 100644 index 0000000000000000000000000000000000000000..793206a5aee333784b14df12ff14d04206fb97ee --- /dev/null +++ b/graph/incidents_graphml/5/549280d0-0938-11ee-a886-17db84346526.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.92 + 100.64.57.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.199 + USER-0015-1270.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.197 + 100.64.26.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 549280d0-0938-11ee-a886-17db84346526 + + + diff --git a/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5aa3726435c5d88b17f0bee650d7d86dc79e59bb --- /dev/null +++ b/graph/incidents_graphml/5/5497dc90-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.196 + 100.64.20.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424740 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5497dc90-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a1fc73d9ae5d09ed47dc366622b59f8f1d17206 --- /dev/null +++ b/graph/incidents_graphml/5/549f0b00-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.251 + 100.64.75.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684856938 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 549f0b00-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb4132134ef2e1704450ec9b50872608f2b6180d --- /dev/null +++ b/graph/incidents_graphml/5/54a2ea90-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.227 + 100.64.93.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693912877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54a2ea90-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f4054de1cbf76aa28edf53cf438c7297f73fd05 --- /dev/null +++ b/graph/incidents_graphml/5/54a67560-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.229 + 100.64.14.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517476 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54a67560-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a071fed9a1812dad49470fbe6f39ead8b763ca4 --- /dev/null +++ b/graph/incidents_graphml/5/54ac00d0-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.196 + 100.64.20.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54ac00d0-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml b/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..374f4f99fb1f54f246522b1b31664cedf0cdc317 --- /dev/null +++ b/graph/incidents_graphml/5/54ae2630-f981-11ed-8187-7f60e9bf0fa8.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.254 + 100.64.75.254 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.255 + 100.64.75.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.76.1 + 100.64.76.1 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.1.40 + HOST-13966 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + INCIDENT_LINK + 1684856938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54ae2630-f981-11ed-8187-7f60e9bf0fa8 + + + diff --git a/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a93ac96c33c0247d4c5e590574f5dd3a8f3d26f6 --- /dev/null +++ b/graph/incidents_graphml/5/54b29ba0-07d3-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.106.136 + 172.21.106.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Apache Web Server"] + + + HOST + 100.64.87.17 + 100.64.87.17 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578971 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54b29ba0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578971 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54b29ba0-07d3-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f994d9d88d77ebb1badf9a0038eb9596af775db0 --- /dev/null +++ b/graph/incidents_graphml/5/54b91f20-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.192 + 100.64.51.192 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.229 + 100.64.82.229 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.41 + 100.64.73.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54b91f20-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..435dc6ec6958efb57d2fbbeec6401a4239ca0192 --- /dev/null +++ b/graph/incidents_graphml/5/54bab850-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.186 + 100.64.92.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693912877 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54bab850-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7891ac078cca59751b91b326f1a256beb112fc9f --- /dev/null +++ b/graph/incidents_graphml/5/54baf4f0-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.198 + 100.64.20.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54baf4f0-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aab29e723262a3343d55910170bcbbc84dcda420 --- /dev/null +++ b/graph/incidents_graphml/5/54c11a80-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.28 + 100.64.41.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54c11a80-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c63538c1d2f37058843f30d47995018836f1c162 --- /dev/null +++ b/graph/incidents_graphml/5/54cafff0-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785316 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54cafff0-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8d2474fb86c382cc778436c96393f7091350cc9 --- /dev/null +++ b/graph/incidents_graphml/5/54cef220-74e7-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.198 + 100.64.20.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698424740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54cef220-74e7-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b406be2af0e1bab2bcffe6d9cc0e5bf3a5a490e5 --- /dev/null +++ b/graph/incidents_graphml/5/54cf6d70-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.15 + 100.64.47.15 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54cf6d70-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4070dcdf2e9b9dbbcd2eb6cb8434f0815336ad2 --- /dev/null +++ b/graph/incidents_graphml/5/54d023f0-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.94 + 100.64.42.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.95 + 100.64.42.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.96 + 100.64.42.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.98 + 100.64.42.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.99 + 100.64.42.99 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789147 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54d023f0-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1ec5ecd3c29fd549d3dd05633a8f9f3f348ae0f --- /dev/null +++ b/graph/incidents_graphml/5/54d08a40-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.176 + USER-0015-2108.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693912877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54d08a40-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d978e650cc3a22580afedcd7a8c627cec031bcc5 --- /dev/null +++ b/graph/incidents_graphml/5/54dade70-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785316 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54dade70-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09fdb285d0e8770ea14761c09ab0a956489bc0c3 --- /dev/null +++ b/graph/incidents_graphml/5/54de3de0-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.141 + 100.64.44.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684823867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 54de3de0-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce363aab4bfd6a6e18d76a816bc95c3552a41caa --- /dev/null +++ b/graph/incidents_graphml/5/54e6aa50-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.60.176 + USER-0015-2108.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693912877 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54e6aa50-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9cad6ace8ee050594e3e4fec5e0aeb7e3aaa85d --- /dev/null +++ b/graph/incidents_graphml/5/54ed9300-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.133 + 100.64.79.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661011710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54ed9300-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54ed9300-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb19f34a91f560ce4609cdaadfa78c98c637c990 --- /dev/null +++ b/graph/incidents_graphml/5/54f2c320-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.41 + 100.64.76.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661011710 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54f2c320-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011710 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54f2c320-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011710 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54f2c320-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011710 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 54f2c320-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93d16ed41d05b9d94a3da15a8e1553f8ab9b0a9b --- /dev/null +++ b/graph/incidents_graphml/5/54f4f6d0-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.15 + 100.64.47.15 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416871 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 54f4f6d0-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1beb10bb28bf8a90306d54265d245622d6437f83 --- /dev/null +++ b/graph/incidents_graphml/5/54fa2a50-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.44.141 + 100.64.44.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684823867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 54fa2a50-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eec9ee723c2268c3d9591d3beeaf3c4ca6170f94 --- /dev/null +++ b/graph/incidents_graphml/5/5504b600-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.41 + 100.64.23.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447365 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5504b600-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02136b1ce4a0ddd6b9a02445d7257579e1f377d2 --- /dev/null +++ b/graph/incidents_graphml/5/5508c0f0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.166 + 100.64.3.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5508c0f0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..249614def37ce8f5b5267639061025d3aeea8343 --- /dev/null +++ b/graph/incidents_graphml/5/550d0640-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.27 + 100.64.21.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1670151400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 550d0640-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 550d0640-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 550d0640-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 550d0640-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml b/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..030163e86928d21761a16bdbd825d6d50ae64d4f --- /dev/null +++ b/graph/incidents_graphml/5/55115bd0-f934-11ed-8612-3352d0d722f9.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684823868 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55115bd0-f934-11ed-8612-3352d0d722f9 + + + INCIDENT_LINK + 1684823868 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55115bd0-f934-11ed-8612-3352d0d722f9 + + + INCIDENT_LINK + 1684823868 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55115bd0-f934-11ed-8612-3352d0d722f9 + + + diff --git a/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..154eb91d20e01c60471f0ce7bfc619aa6092a9e2 --- /dev/null +++ b/graph/incidents_graphml/5/551b4380-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.17 + 100.64.47.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 551b4380-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e48fbba4ff5d309849b669152dafb8396e4dfd8 --- /dev/null +++ b/graph/incidents_graphml/5/551bbdb0-07d3-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.22.177 + 172.31.22.177 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.19 + 100.64.87.19 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.20 + 100.64.87.20 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.21 + 100.64.87.21 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.22 + 100.64.87.22 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.23 + 100.64.87.23 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.24 + 100.64.87.24 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.25 + 100.64.87.25 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578972 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 551bbdb0-07d3-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95d44aa8cbd6146685cecd1304cbdc2f5ee4755a --- /dev/null +++ b/graph/incidents_graphml/5/551fad20-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.138 + 100.64.34.138 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1694736652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 551fad20-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b62ff16a8f8d54c0a324d82645c81ee256a52324 --- /dev/null +++ b/graph/incidents_graphml/5/55229e40-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.41 + 100.64.23.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447365 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55229e40-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9732b63b19fd74b1333fce9b161055004fd110fc --- /dev/null +++ b/graph/incidents_graphml/5/5522ba60-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.34.138 + 100.64.34.138 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694736652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5522ba60-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0bbfcaa7f6eb9c7b79bda617d5a3a81f5b9dfa9 --- /dev/null +++ b/graph/incidents_graphml/5/55244380-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.236 + USER-0015-1335.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55244380-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac69237a9b2f8ff6a97fc11ee4734568cc7be734 --- /dev/null +++ b/graph/incidents_graphml/5/55342200-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.236 + USER-0015-1335.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55342200-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81955e501ea9e3f2ec0b0c4916c36c72c26a6eb8 --- /dev/null +++ b/graph/incidents_graphml/5/553db3a0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.58 + 100.64.30.58 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473565 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 553db3a0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03a809dd68b77fcd44e60e948ae5198eeff26e23 --- /dev/null +++ b/graph/incidents_graphml/5/55406310-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.229 + 100.64.93.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693912878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55406310-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77e69a9f9daf74a3e0236c9fdb6025e7d083c1c1 --- /dev/null +++ b/graph/incidents_graphml/5/55428250-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.43 + 100.64.23.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447365 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55428250-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19f9f3b2bd1e900d0ececfec94e628794dbd0e53 --- /dev/null +++ b/graph/incidents_graphml/5/55444ea0-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.238 + 100.64.41.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55444ea0-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43a896508774de31e8b271b793cdb785759cd0e9 --- /dev/null +++ b/graph/incidents_graphml/5/554af9d0-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.15 + 100.64.83.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657013955 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 554af9d0-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013955 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 554af9d0-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f38c6e2d51b1501f6600a0e5ce67565bc2e27c3 --- /dev/null +++ b/graph/incidents_graphml/5/554f2fe0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.240 + 100.64.52.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518039 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 554f2fe0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcab83faf4491c0c47641b79a5fa06730e7dc032 --- /dev/null +++ b/graph/incidents_graphml/5/5554f070-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.240 + 100.64.41.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5554f070-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70f243f7d2ae86b8edfef2dcc1fd4d2fed2e74ae --- /dev/null +++ b/graph/incidents_graphml/5/55564d80-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694736652 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55564d80-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d04377bd78a904b4ac2b7ba1deabbcca425069f7 --- /dev/null +++ b/graph/incidents_graphml/5/5556cb50-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.223 + 100.64.45.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694735 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5556cb50-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef9fae21d3b841be78c714135fe287f0d6f97a47 --- /dev/null +++ b/graph/incidents_graphml/5/55571bc0-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447366 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55571bc0-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89bc483e44395523a54050e9f5389f40c61aa10c --- /dev/null +++ b/graph/incidents_graphml/5/55680f10-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.240 + 100.64.52.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518039 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55680f10-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..646b0f75a6e2e299eab0fd69d10a6d3ac71c4fff --- /dev/null +++ b/graph/incidents_graphml/5/556914b0-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.240 + 100.64.41.240 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 556914b0-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13fe66c98eaa124e2fd80e5426afa90633bdeb92 --- /dev/null +++ b/graph/incidents_graphml/5/556ceb60-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.223 + 100.64.45.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694735 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 556ceb60-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e65d3a4fa1e54ba9f3fdc44b5b8609df5889d02 --- /dev/null +++ b/graph/incidents_graphml/5/5578ad80-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5578ad80-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5abe8077993ea96d4442f0df01573fea33e73d12 --- /dev/null +++ b/graph/incidents_graphml/5/557af520-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.225 + 100.64.45.225 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 557af520-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b80fd2f5c0611b68877234903f5a6cc952f71809 --- /dev/null +++ b/graph/incidents_graphml/5/557c2780-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.242 + 100.64.41.242 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 557c2780-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6ebf484acfa8f2213633dc1882505a5e15896d4 --- /dev/null +++ b/graph/incidents_graphml/5/557ccf90-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518039 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 557ccf90-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e88c79a8375c5bec1b56f83cd7ea0ed22f348a9 --- /dev/null +++ b/graph/incidents_graphml/5/558af490-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.242 + 100.64.41.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785318 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 558af490-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d57b5850b6b18e44d9ffb91e6ea4926da1e133d --- /dev/null +++ b/graph/incidents_graphml/5/558e7d20-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.225 + 100.64.45.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 558e7d20-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2e29c2b56bcc25443759cb6ecb46e986be8e066 --- /dev/null +++ b/graph/incidents_graphml/5/558ffb20-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699836926 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 558ffb20-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836926 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 558ffb20-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9d97f4ce9390c68aa3cb033884ecd0a3a42f8c2 --- /dev/null +++ b/graph/incidents_graphml/5/5591ac40-0c4d-11ef-8e07-3732a564a2cf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.155 + 100.64.62.155 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715071176 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5591ac40-0c4d-11ef-8e07-3732a564a2cf + + + diff --git a/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d585198f119a4d056d9d2cad2d380e0992b46ee --- /dev/null +++ b/graph/incidents_graphml/5/5593b2f0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518039 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5593b2f0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e28dfb7ed86a74d73a9a33412d726029580c45e1 --- /dev/null +++ b/graph/incidents_graphml/5/55a689d0-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.77 + 100.64.26.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018147 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 55a689d0-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml b/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f67de07aba81a8d291807197b692119fc7a3045 --- /dev/null +++ b/graph/incidents_graphml/5/55b062f0-4bde-11ee-b303-01ff5f8330ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.231 + 100.64.93.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693912878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55b062f0-4bde-11ee-b303-01ff5f8330ea + + + diff --git a/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e08e3022301033acb10f61bd91684f20cffa5d5 --- /dev/null +++ b/graph/incidents_graphml/5/55b803b0-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.172.29 + 192.168.172.29 + [] + 0.4375 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.196 + 100.64.0.196 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55b803b0-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55b803b0-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f0c71820186fc0d35c352e036d9dcf20a6fe3b3 --- /dev/null +++ b/graph/incidents_graphml/5/55bbe690-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.77 + 100.64.26.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018147 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55bbe690-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ecc6567114398331c2725895362525c53a46a4 --- /dev/null +++ b/graph/incidents_graphml/5/55c73970-dd61-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.11.15 + 100.64.11.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1709912061 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55c73970-dd61-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912061 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55c73970-dd61-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76a4c7b1901dffc01980f988a6c6d80f3bec52cd --- /dev/null +++ b/graph/incidents_graphml/5/55c90f60-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.91.158 + 100.64.91.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710973 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 55c90f60-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml b/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efce0ceb08418347ac6a696509290ace028e3422 --- /dev/null +++ b/graph/incidents_graphml/5/55cfecd0-4ab5-11ee-9b83-fb7ec290b354.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.244 + 100.64.41.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693785318 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55cfecd0-4ab5-11ee-9b83-fb7ec290b354 + + + diff --git a/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fee54f879c1a57ba024dadf55731aace2fe6ccb --- /dev/null +++ b/graph/incidents_graphml/5/55d0bb60-00b8-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.162 + 100.64.70.162 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.51.184 + 100.64.51.184 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713797718 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797718 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797718 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797718 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 55d0bb60-00b8-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7ca970010e9bd6e25262d1479c4b1d5a6fe6ba7 --- /dev/null +++ b/graph/incidents_graphml/5/55f29cf0-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.237 + 100.64.44.237 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908355 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 55f29cf0-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68f9d782264e652c07040c18864b11001adf0b84 --- /dev/null +++ b/graph/incidents_graphml/5/56076ec0-e50c-11ee-9817-3f0d09cf653c.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.69.20 + 100.64.69.20 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.69.21 + 100.64.69.21 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.22 + 100.64.69.22 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755164 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 56076ec0-e50c-11ee-9817-3f0d09cf653c + + + diff --git a/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94e895d0cb9099c9ade851d031064c4738de06df --- /dev/null +++ b/graph/incidents_graphml/5/560e20e0-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831247 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 560e20e0-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3b882894633bb6a34d02ea801cbba03a1ab2964 --- /dev/null +++ b/graph/incidents_graphml/5/56117710-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.87 + 100.64.23.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56117710-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e9a33bef0c97a9500cbb5e2619d1feb7ddffe04 --- /dev/null +++ b/graph/incidents_graphml/5/56188db0-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.148 + 100.64.80.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335684 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56188db0-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f7996bab30e9c1253c20552a38c66a3527089fc --- /dev/null +++ b/graph/incidents_graphml/5/5618c670-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + USER-0015-1491.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5618c670-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fa5227945edc88519d4661f48874d35d452abc5 --- /dev/null +++ b/graph/incidents_graphml/5/5622b520-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.87 + 100.64.23.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517479 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5622b520-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..991d2513767c554ddc334d6fa01f09dc63dc5aef --- /dev/null +++ b/graph/incidents_graphml/5/5626e590-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.148 + 100.64.80.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335684 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5626e590-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..330a830df1aa44be361aac33beca603fca213f3c --- /dev/null +++ b/graph/incidents_graphml/5/562bf0e0-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.235.123 + 192.168.248.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.4 + 100.64.83.4 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662136993 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 562bf0e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136993 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 562bf0e0-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..820a152049cda77faa9bee9ac2b10d0a03941425 --- /dev/null +++ b/graph/incidents_graphml/5/5630d2e0-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.5 + 100.64.83.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.144 + 100.64.72.144 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662136993 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5630d2e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136993 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5630d2e0-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b938de8b28457fbc10945497f400a66bb146e17 --- /dev/null +++ b/graph/incidents_graphml/5/5632bab0-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.163 + 100.64.39.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5632bab0-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df4bde0c3bf11ce02df6e073ca7eadd10bb419e4 --- /dev/null +++ b/graph/incidents_graphml/5/5635d550-295d-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.238 + 100.64.19.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.148 + 100.64.16.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.218 + 100.64.66.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.36 + 100.64.11.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.219 + 100.64.66.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.220 + 100.64.66.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.246 + 100.64.13.246 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.175 + 100.64.16.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.239 + 100.64.19.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.221 + 100.64.66.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.222 + 100.64.66.222 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.223 + 100.64.66.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.224 + 100.64.66.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + INCIDENT_LINK + 1690119135 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5635d550-295d-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9d51ce2fc0b491dc509ea0703b664cb4abc2a7b --- /dev/null +++ b/graph/incidents_graphml/5/563e2060-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.47 + 100.64.23.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447367 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 563e2060-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..283a0a724c1ae9b950528c6b82dc829f87921ca6 --- /dev/null +++ b/graph/incidents_graphml/5/5651f6b0-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.38 + 100.64.66.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5651f6b0-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b45b058e7e03e6d4e7d5a52e464c7f171a2fc55 --- /dev/null +++ b/graph/incidents_graphml/5/565225f0-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.10 + 100.64.69.10 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 565225f0-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 565225f0-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0f4e74a995a327b82ed65ae7ac05d9fb5189c3b --- /dev/null +++ b/graph/incidents_graphml/5/56529ae0-ba69-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.57 + 100.64.83.57 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677919710 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56529ae0-ba69-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bca9114a905684b3a27ba98de9bf2d9d3cc29503 --- /dev/null +++ b/graph/incidents_graphml/5/56531050-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.11 + 100.64.69.11 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56531050-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56531050-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc1c6c4f4fe5024be14e375e0e464b4cc4fcec99 --- /dev/null +++ b/graph/incidents_graphml/5/565448c0-6092-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.26 + 100.64.69.26 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1696189212 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 565448c0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189212 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 565448c0-6092-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33546540edfc1a0d62a6148c881ceadb11d9c88b --- /dev/null +++ b/graph/incidents_graphml/5/565a14f0-ba69-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.83.57 + 100.64.83.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1677919710 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 565a14f0-ba69-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f81c75aa0b5bb98d478f7df5b0a3c960e91607a3 --- /dev/null +++ b/graph/incidents_graphml/5/565e5290-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.47 + 100.64.23.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 565e5290-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e88173d0f7adbf46acfa8436b1532f8cd2c719b0 --- /dev/null +++ b/graph/incidents_graphml/5/5663a9f0-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.38 + 100.64.66.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5663a9f0-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b047e705421fe1a2c0dfa880f7f11d95835f856e --- /dev/null +++ b/graph/incidents_graphml/5/56727700-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,807 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.41 + 100.64.66.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.169 + 100.64.10.169 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.42 + 100.64.66.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.104 + 100.64.3.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.48 + 100.64.16.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.43 + 100.64.66.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.44 + 100.64.66.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.151 + 100.64.22.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.251 + 100.64.13.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.45 + 100.64.66.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.46 + 100.64.66.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.47 + 100.64.66.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56727700-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56da734b15deee2832f8018a6965a1fc569cbf9b --- /dev/null +++ b/graph/incidents_graphml/5/5676da50-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.193 + 100.64.80.193 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335684 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5676da50-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a5fc103ca128e30a863e9b2cabfde4f4a1222c6 --- /dev/null +++ b/graph/incidents_graphml/5/567d6a00-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.193 + 100.64.80.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335684 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 567d6a00-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..046cc2f6d05066dc86d27eed3761b72f496ea1e3 --- /dev/null +++ b/graph/incidents_graphml/5/567eadf0-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.74 + 100.64.14.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570377 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 567eadf0-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec4a02c0b739131c55dec3707eed63ad5fda41c1 --- /dev/null +++ b/graph/incidents_graphml/5/56811d00-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 56811d00-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..301e0b45e499c6c30315c47dee0eea0651c22579 --- /dev/null +++ b/graph/incidents_graphml/5/568eca00-3caa-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.174 + USER-0015-2047.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1720388776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 568eca00-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 568eca00-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 568eca00-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 568eca00-3caa-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d73cdf9e928a05fa7a4aabbf14b50c0dbaa297d --- /dev/null +++ b/graph/incidents_graphml/5/56903830-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 56903830-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b61c1b81eda31f6b9a0707e00f8e767d4f0701fd --- /dev/null +++ b/graph/incidents_graphml/5/56a4a7a0-07d3-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.116.1 + 172.25.116.1 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.33 + 100.64.87.33 + ["Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578974 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 56a4a7a0-07d3-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578974 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 56a4a7a0-07d3-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42ac59bed54e0a2e05d2555ee8930fb74da1a841 --- /dev/null +++ b/graph/incidents_graphml/5/56a4d1a0-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 56a4d1a0-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb493f51a554436ae93518d2bd70a9e55a6c124e --- /dev/null +++ b/graph/incidents_graphml/5/56a539f0-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.83 + 100.64.29.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.178 + 100.64.60.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.167 + 100.64.24.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.179 + 100.64.60.179 + ["Exploiting Host"] + 0.83125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.180 + 100.64.60.180 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.181 + 100.64.60.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.182 + 100.64.60.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.107 + 100.64.60.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.183 + 100.64.60.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.91 + 100.64.30.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.189 + 100.64.45.189 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456588 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56a539f0-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9c5952405edbf692df456003fc366fbe183bf89 --- /dev/null +++ b/graph/incidents_graphml/5/56b21060-0c4d-11ef-8e07-3732a564a2cf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715071177 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56b21060-0c4d-11ef-8e07-3732a564a2cf + + + diff --git a/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6b5fca64f613323212c22502fb3557d91e1c1b6 --- /dev/null +++ b/graph/incidents_graphml/5/56bf5500-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.195 + 100.64.80.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56bf5500-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cabbf11a718066573eb78abba54ee45445cbf2eb --- /dev/null +++ b/graph/incidents_graphml/5/56c659e0-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.195 + 100.64.80.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660335685 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 56c659e0-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98c0f1292ebff02284985138a639a8b179b1d879 --- /dev/null +++ b/graph/incidents_graphml/5/56c682c0-0c4d-11ef-8e07-3732a564a2cf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715071178 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 56c682c0-0c4d-11ef-8e07-3732a564a2cf + + + diff --git a/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7838f96c92f8ac292dc0e45928943dce693b70a --- /dev/null +++ b/graph/incidents_graphml/5/56e66500-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.196 + 100.64.80.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.41 + 100.64.72.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335685 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56e66500-1a7c-11ed-962e-e94bb46215af + + + INCIDENT_LINK + 1660335685 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 56e66500-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8635fa8d4bb0320d35a51e1b48e91ab0ba75888c --- /dev/null +++ b/graph/incidents_graphml/5/56eaaac0-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.109 + 100.64.75.109 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 56eaaac0-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml b/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b28567916023550f6c4655ce823d6d5e64d966b9 --- /dev/null +++ b/graph/incidents_graphml/5/56efdae0-1a7c-11ed-962e-e94bb46215af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.109 + 100.64.75.109 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660335685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 56efdae0-1a7c-11ed-962e-e94bb46215af + + + diff --git a/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a027c9ac26e82a9f13a8de118e584b1f24c6e25 --- /dev/null +++ b/graph/incidents_graphml/5/56f717f0-866f-11ee-8f03-878f88d78f03.graphml @@ -0,0 +1,393 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.22.246 + 100.64.22.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.189 + 100.64.69.189 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.37.97 + 100.64.37.97 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.190 + 100.64.69.190 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 56f717f0-866f-11ee-8f03-878f88d78f03 + + + diff --git a/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a7e9cb6c1d9efb31b74c8feb54403e699fa1aae --- /dev/null +++ b/graph/incidents_graphml/5/56fbb530-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.40 + 100.64.59.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 56fbb530-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e3f9cf02b2d7e96b2d0b9d08a719b4ab26f42f8 --- /dev/null +++ b/graph/incidents_graphml/5/5706c910-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.180.115 + 192.168.180.115 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.89.185 + 100.64.89.185 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 192.168.158.15 + 192.168.158.15 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5706c910-7bdf-11ee-b624-7d3a11587cf9 + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5706c910-7bdf-11ee-b624-7d3a11587cf9 + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5706c910-7bdf-11ee-b624-7d3a11587cf9 + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5706c910-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24645948a2d1c6ad5c56f29b3183fe042a8ecaa6 --- /dev/null +++ b/graph/incidents_graphml/5/57094100-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.68 + 100.64.37.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57094100-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6ee8edebb48e3140e3339372a8d3b883caf7073 --- /dev/null +++ b/graph/incidents_graphml/5/570eef10-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.40 + 100.64.59.40 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831249 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 570eef10-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02b2020db937eedc50ffe9a7a74cb5c87b2fb3c9 --- /dev/null +++ b/graph/incidents_graphml/5/57140f80-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.187 + 100.64.89.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57140f80-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b8d62544ccf2be41d0f37e5ee4a2471b91f1b2b --- /dev/null +++ b/graph/incidents_graphml/5/571b1b50-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.68 + 100.64.37.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 571b1b50-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4088de1f62975618e4f4223f498a98c63b2b2fb --- /dev/null +++ b/graph/incidents_graphml/5/57212ee0-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.89.187 + 100.64.89.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699190966 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57212ee0-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml b/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bead2919343dfd1aff585c08e18223c0af54df99 --- /dev/null +++ b/graph/incidents_graphml/5/572c53c0-04e8-11ed-9475-7d81a00fe647.graphml @@ -0,0 +1,517 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.60 + 100.64.18.60 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.139 + 100.64.71.139 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.177 + 100.64.71.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.178 + 100.64.71.178 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + USER-0015-1622.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.180 + USER-0015-1623.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.181 + 100.64.71.181 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.182 + 100.64.71.182 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + 100.64.1.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.183 + 100.64.71.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.184 + 100.64.71.184 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.185 + 100.64.71.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.37 + HOST-12731 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.186 + 100.64.71.186 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + INCIDENT_LINK + 1657963145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 572c53c0-04e8-11ed-9475-7d81a00fe647 + + + diff --git a/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d171b69d98729798839fbc11d9cf0a6d9e63e016 --- /dev/null +++ b/graph/incidents_graphml/5/572e1da0-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710976 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 572e1da0-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e371880c4fb595873064cb56f264a1f6324499b --- /dev/null +++ b/graph/incidents_graphml/5/573151f0-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677710976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 573151f0-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe46c26b0513aab48225e58addf798cdc8da40b0 --- /dev/null +++ b/graph/incidents_graphml/5/57354990-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710976 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57354990-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8d0d91ba7c6c274d392c7b1c8a975b89fffb749 --- /dev/null +++ b/graph/incidents_graphml/5/57428d60-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.43 + 100.64.35.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57428d60-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6c724e91d54a3ab94ee81ca09acfbc28fd6581f --- /dev/null +++ b/graph/incidents_graphml/5/5745d970-3026-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.29 + 100.64.15.29 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690865172 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5745d970-3026-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865172 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5745d970-3026-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d9dafa5206639bde2ee7ec0cfc3125aa30e9283 --- /dev/null +++ b/graph/incidents_graphml/5/574c9d80-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,867 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.190 + 100.64.60.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.47 + 100.64.34.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.4 + 100.64.50.4 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.88 + 100.64.9.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.191 + 100.64.60.191 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.54 + 100.64.37.54 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.192 + 100.64.60.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.129 + 100.64.23.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.193 + 100.64.60.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.194 + 100.64.60.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456589 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 574c9d80-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff13b0a0760a710edba5ac2021b3cea9cceade5e --- /dev/null +++ b/graph/incidents_graphml/5/574c9f40-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.25 + 100.64.23.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1720774895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 574c9f40-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17f7e219d2cd8405e8886c50936d9be8eb7a4f59 --- /dev/null +++ b/graph/incidents_graphml/5/57509df0-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,213 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + HOST-17989 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.210 + 100.64.90.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.99 + 100.64.61.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.211 + 100.64.90.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389207 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57509df0-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d3af2ab5ff8ba847e22f90b1c5488b1882a5c69 --- /dev/null +++ b/graph/incidents_graphml/5/5752e110-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.43 + 100.64.35.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5752e110-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee07d902d583ce4d50d0c375935cd3c74ad57dc9 --- /dev/null +++ b/graph/incidents_graphml/5/575927c0-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.58 + 100.64.64.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.118 + 100.64.43.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.161 + 100.64.20.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.98 + 100.64.21.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + INCIDENT_LINK + 1702797880 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 575927c0-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea6844d7b8c2737260c6bc8d3ac0582e3ac6e7c6 --- /dev/null +++ b/graph/incidents_graphml/5/575efb30-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699190966 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 575efb30-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e8d08424b8c9cc845bf10d610c371873af96cd9 --- /dev/null +++ b/graph/incidents_graphml/5/5762bf50-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.23.25 + 100.64.23.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5762bf50-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e0a3efcfad2d2fa1eafd768116320cd0372ff26 --- /dev/null +++ b/graph/incidents_graphml/5/57649450-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.45 + 100.64.35.45 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57649450-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2f42fa202bebfdddf99359c0feb333af8d68c88 --- /dev/null +++ b/graph/incidents_graphml/5/576562d0-3c70-11ee-89e7-7976671c0f18.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.199 + 100.64.69.199 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692216369 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576562d0-3c70-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216369 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576562d0-3c70-11ee-89e7-7976671c0f18 + + + diff --git a/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e03a7e3520df6e35249df529780c91e0a1ad1eb --- /dev/null +++ b/graph/incidents_graphml/5/5766e970-3c70-11ee-89e7-7976671c0f18.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.112 + 100.64.41.112 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692216369 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5766e970-3c70-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216369 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5766e970-3c70-11ee-89e7-7976671c0f18 + + + diff --git a/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7348d850f5f26fbabbcce77bd361930ba6a1ddd3 --- /dev/null +++ b/graph/incidents_graphml/5/576c5a80-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.200 + 100.64.60.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.201 + 100.64.60.201 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456590 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 576c5a80-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d436821bbf077713a9e2f6090bf80320793de0d3 --- /dev/null +++ b/graph/incidents_graphml/5/576d04f0-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699190967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 576d04f0-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f971065e9699399e4afd29ce2565249d82d16c1 --- /dev/null +++ b/graph/incidents_graphml/5/576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,717 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.13 + 100.64.77.13 + ["Exploiting Host","Exploiting Target"] + 0.940673828125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.14 + 100.64.77.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.15 + 100.64.77.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.16 + 100.64.77.16 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.36 + 100.64.73.36 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.127 + 100.64.72.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.1.37 + 100.64.1.37 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.97943359375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.17 + 100.64.77.17 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.49 + 100.64.72.49 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.18 + 100.64.77.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.19 + 100.64.77.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761948 + malicious + 0.97943359375 + 0.97943359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576e3bc0-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a79ed2439840c273f7afde33187c7371a5b90f2e --- /dev/null +++ b/graph/incidents_graphml/5/576ead60-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.164 + 100.64.80.164 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659285996 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576ead60-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659285996 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 576ead60-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09850b45f3b3fd87458d7108ea1fd92b01f75e92 --- /dev/null +++ b/graph/incidents_graphml/5/5770af30-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.138 + 100.64.43.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5770af30-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70b72b2637eee269bbbbc22edda50e1196bf4682 --- /dev/null +++ b/graph/incidents_graphml/5/57770aa0-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.76 + 100.64.64.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1720774895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57770aa0-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e2c940b601912522009ed59a916fa45894f7d02 --- /dev/null +++ b/graph/incidents_graphml/5/577ba6a0-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.117 + 100.64.6.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557029 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 577ba6a0-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0270420b62b83fc77149110b8c310c644a852be0 --- /dev/null +++ b/graph/incidents_graphml/5/577dd850-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.222 + USER-0015-1311.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 577dd850-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..310acb5b014cdeb7839c22c53bb5889b2407c252 --- /dev/null +++ b/graph/incidents_graphml/5/578006b0-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.196 + 100.64.81.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.89 + 100.64.80.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.197 + 100.64.81.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.111 + 100.64.80.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.198 + 100.64.81.198 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578006b0-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfc62fe69d62a3082af8f29e2994846cb3b8d9ff --- /dev/null +++ b/graph/incidents_graphml/5/5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.138 + 100.64.43.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5780b4c0-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d12268a4408efda27a00c42e22357dc19f3e710a --- /dev/null +++ b/graph/incidents_graphml/5/5784c2a0-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.55 + 100.64.82.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.56 + 100.64.82.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.57 + 100.64.82.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.23.24 + 100.64.23.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.58 + 100.64.82.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.62.137 + 100.64.62.137 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.23.141 + USER-0015-1918.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.59 + 100.64.82.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760805 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5784c2a0-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10278cf36bba62f0ef921f1e3113ae81466c017f --- /dev/null +++ b/graph/incidents_graphml/5/578ca110-28c0-11ee-9c7b-cd7423cdcafa.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.53.225 + 100.64.53.225 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.23.175 + 100.64.23.175 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051706 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578ca110-28c0-11ee-9c7b-cd7423cdcafa + + + diff --git a/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..904c14f86cffa1e1623977f2eac8f9383b3faaf2 --- /dev/null +++ b/graph/incidents_graphml/5/578d0bc0-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.117 + 100.64.6.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557030 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 578d0bc0-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1d04ceeefae34a0b40367a5c2f1439d2598dca2 --- /dev/null +++ b/graph/incidents_graphml/5/578db6d0-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.222 + USER-0015-1311.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517481 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 578db6d0-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0b742401c881b861a0a40ee541503b56157769b --- /dev/null +++ b/graph/incidents_graphml/5/578dee00-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.64.76 + 100.64.64.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 578dee00-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee9b8e9c7239a71cd164a4bfe0756c5b3e3785e5 --- /dev/null +++ b/graph/incidents_graphml/5/578f33b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.140 + 100.64.43.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 578f33b0-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c90f1f8cc77ddf9b7cabdde6c44bba05f48d88a6 --- /dev/null +++ b/graph/incidents_graphml/5/579f73a0-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,489 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.29 + 100.64.17.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.79 + 100.64.26.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.83 + 100.64.23.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.107 + 100.64.19.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.80 + 100.64.26.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.81 + 100.64.26.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.82 + 100.64.26.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + INCIDENT_LINK + 1710018150 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 579f73a0-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9f0a8c0c5facdf8edf9e3cb5c03fa667b590678 --- /dev/null +++ b/graph/incidents_graphml/5/579fca40-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 579fca40-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ce32d710ddc2405aacc8f9171124147d7e13733 --- /dev/null +++ b/graph/incidents_graphml/5/57a21f70-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.142 + 100.64.43.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57a21f70-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b6ea0dc111ce11605c787cb092527c51817e02d --- /dev/null +++ b/graph/incidents_graphml/5/57a24f80-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.30 + 100.64.65.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158949 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57a24f80-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc5b8190353c13da28d5b9805d9b1fe7d77e5a52 --- /dev/null +++ b/graph/incidents_graphml/5/57a44350-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.13 + 100.64.29.13 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901777 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57a44350-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901777 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57a44350-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml b/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d53400798cdd608884f61282423859f49033da0d --- /dev/null +++ b/graph/incidents_graphml/5/57b17500-de58-11ee-aaa4-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.29 + 100.64.17.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710018150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57b17500-de58-11ee-aaa4-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bc0af71a52c946ff2fae4565a363e77c40ed1bb --- /dev/null +++ b/graph/incidents_graphml/5/57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57b3d2b0-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e8864624602f3961bc9b3571dae54e7785b10de --- /dev/null +++ b/graph/incidents_graphml/5/57b4eef0-3026-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.69 + 100.64.69.69 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1690865173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57b4eef0-3026-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57b4eef0-3026-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67e55586d2c26fd16e88e519b73eef020abb4afb --- /dev/null +++ b/graph/incidents_graphml/5/57b5ea50-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528129 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57b5ea50-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e04518a690efe97d943453e11ce959b1a436771 --- /dev/null +++ b/graph/incidents_graphml/5/57bd9220-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.227 + 100.64.45.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57bd9220-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d1118ff3f4e8886b57ada41f86197297a01c5c2 --- /dev/null +++ b/graph/incidents_graphml/5/57c49b90-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57c49b90-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f67387ebdcd2d91399ebe3c7b6487e761503dc2c --- /dev/null +++ b/graph/incidents_graphml/5/57d0cc00-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.227 + 100.64.45.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57d0cc00-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml b/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5ee624ee704c196b5b696f82f07f76f8cf8b5d1 --- /dev/null +++ b/graph/incidents_graphml/5/57d16d10-19d3-11ed-a648-2b78b076beb3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.124 + 100.64.71.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.125 + 100.64.71.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660263102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57d16d10-19d3-11ed-a648-2b78b076beb3 + + + INCIDENT_LINK + 1660263102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57d16d10-19d3-11ed-a648-2b78b076beb3 + + + INCIDENT_LINK + 1660263102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57d16d10-19d3-11ed-a648-2b78b076beb3 + + + INCIDENT_LINK + 1660263102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57d16d10-19d3-11ed-a648-2b78b076beb3 + + + diff --git a/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39949fd7e2b1502d6134b72ce83c8d19ce3276d7 --- /dev/null +++ b/graph/incidents_graphml/5/57d85480-9ad9-11ee-a153-0bcaae5115e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.157 + 100.64.62.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702596876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57d85480-9ad9-11ee-a153-0bcaae5115e2 + + + diff --git a/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7aa056a2207a31c479047666c97d2f504840f3f --- /dev/null +++ b/graph/incidents_graphml/5/57d856e0-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.219 + USER-0015-1813.example.internal + ["Exploiting Target","Exploiting Host"] + 0.87625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.217 + 100.64.71.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.242 + 100.64.71.242 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661011714 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57d856e0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011714 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57d856e0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011714 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57d856e0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011714 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57d856e0-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0137349442141fae2b4f7d7c55f6e657249c2691 --- /dev/null +++ b/graph/incidents_graphml/5/57dd97d0-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.19 + 100.64.47.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 57dd97d0-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a85e8173d996ade89b386bc8ba38a43d7a2a91fb --- /dev/null +++ b/graph/incidents_graphml/5/57ded280-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.60 + 100.64.64.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797881 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57ded280-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7c60fb571eb44edc738d089befbb370f47c3724 --- /dev/null +++ b/graph/incidents_graphml/5/57e857b0-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.36 + 100.64.73.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.16 + 100.64.79.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208950 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57e857b0-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208950 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 57e857b0-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a956f3ada1c5054f7598ca6fc56f68a6cbb0ff8 --- /dev/null +++ b/graph/incidents_graphml/5/57f90f10-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.19 + 100.64.47.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 57f90f10-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56ffe7185bac7c2b1c5df3ac4ea9e89e756655bd --- /dev/null +++ b/graph/incidents_graphml/5/580cbb30-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.47 + 100.64.35.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131496 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 580cbb30-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffb8f5fb937bf30c041b3c23743a3c8ca9eac47f --- /dev/null +++ b/graph/incidents_graphml/5/580f0320-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,495 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.204 + 100.64.60.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.205 + 100.64.60.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.219 + 100.64.28.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.51 + 100.64.58.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.34 + 100.64.7.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.32 + 100.64.42.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.123 + 100.64.42.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.206 + 100.64.60.206 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.207 + 100.64.60.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.158 + 100.64.44.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.208 + 100.64.60.208 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456591 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 580f0320-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..925d3cc8e2b7dcb6bb7500630b0fd4bb384663d7 --- /dev/null +++ b/graph/incidents_graphml/5/58113430-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.113 + USER-0015-2032.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1699190968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58113430-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61f6a2714c86396a4160ebc889e21eb169bcffb2 --- /dev/null +++ b/graph/incidents_graphml/5/58160cf0-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.21 + 100.64.47.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58160cf0-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b5075c587b3639ff4bd704ee922ca919dbf52be --- /dev/null +++ b/graph/incidents_graphml/5/58179210-dd61-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.132 + 100.64.4.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709912065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58179210-dd61-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbe7bd3b98de344097efb36a16c9163fdd0109f4 --- /dev/null +++ b/graph/incidents_graphml/5/581f6500-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.58.113 + USER-0015-2032.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699190968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 581f6500-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8296096a64f33e808951ede86b8c3b9487ea107 --- /dev/null +++ b/graph/incidents_graphml/5/581fe110-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,97 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.69.12 + 100.64.69.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + INCIDENT_LINK + 1703084355 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 581fe110-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084355 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 581fe110-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084355 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 581fe110-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92d8d7a1f390390508040b506de42d548019cebc --- /dev/null +++ b/graph/incidents_graphml/5/5820b860-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.47 + 100.64.35.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131496 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5820b860-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..286373f4cc937102e4daca1fb879d4f1bb2ce4f7 --- /dev/null +++ b/graph/incidents_graphml/5/582bb7d0-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.142 + 100.64.12.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 582bb7d0-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df06eb18e3178423f59263d467f284a1b0a94577 --- /dev/null +++ b/graph/incidents_graphml/5/582c6120-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.141 + USER-0015-1368.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725435 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 582c6120-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43b869e551ad8703e956abb231fff3c86f784d20 --- /dev/null +++ b/graph/incidents_graphml/5/582ca0b0-dd61-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.4.132 + 100.64.4.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709912065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 582ca0b0-dd61-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9e5e279e237fca1f5c040cc446a07e7b6dbd25f --- /dev/null +++ b/graph/incidents_graphml/5/5835ee10-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.49 + 100.64.35.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131496 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5835ee10-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e03b5b699b991cda4aac70b0b8db1fe6034a4636 --- /dev/null +++ b/graph/incidents_graphml/5/5840d380-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.156 + 100.64.19.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725435 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5840d380-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10723a2e143d14c2bf00332ec2918b648242a027 --- /dev/null +++ b/graph/incidents_graphml/5/58413ba0-07b1-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.142 + 100.64.12.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686416876 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58413ba0-07b1-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml b/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25687082b8857a1d65eb160f910c5a9f7ff664e0 --- /dev/null +++ b/graph/incidents_graphml/5/584668d0-4ddb-11ee-9c4b-a19d1bad2d38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.49 + 100.64.35.49 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694131496 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 584668d0-4ddb-11ee-9c4b-a19d1bad2d38 + + + diff --git a/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57e74296e40b85a2bcf704289758570c3b24ac56 --- /dev/null +++ b/graph/incidents_graphml/5/584ab3b0-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.96 + 100.64.54.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797882 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 584ab3b0-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b058a2dca2ddcd0f772e008167ab2af7fb707f2 --- /dev/null +++ b/graph/incidents_graphml/5/585286c0-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.170 + 100.64.43.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725435 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 585286c0-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..470c997e650287df14730de56b4b7b43c1ff2313 --- /dev/null +++ b/graph/incidents_graphml/5/58629e80-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.112 + 100.64.76.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.199 + 100.64.81.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58629e80-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ac27300a5294b2eb6883e1dc5e7dc9e8307a9d1 --- /dev/null +++ b/graph/incidents_graphml/5/5862f6a0-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.96 + 100.64.54.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797882 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5862f6a0-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4d25826d7a1ef5b46fa4426e2eeb9f979ef1d7c --- /dev/null +++ b/graph/incidents_graphml/5/5863e440-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5863e440-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fe3f52c15711ac58291090898531c7886e380f4 --- /dev/null +++ b/graph/incidents_graphml/5/58644c30-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.200 + 100.64.81.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.201 + 100.64.81.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.202 + 100.64.81.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58644c30-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfdef454c5b090c76dae1212fc54ed53697faa0b --- /dev/null +++ b/graph/incidents_graphml/5/58664120-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58664120-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40facb3e46be6f6cf5a5780b28761b0f702f1d68 --- /dev/null +++ b/graph/incidents_graphml/5/586c5050-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.170 + 100.64.43.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725435 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 586c5050-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ca4128653f1495c9a48368989b2f738164b1219 --- /dev/null +++ b/graph/incidents_graphml/5/5873aea0-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.89 + 100.64.40.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5873aea0-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6764c84d905ca7ea950ba44beb3e8172551c83ad --- /dev/null +++ b/graph/incidents_graphml/5/58763080-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.62 + 100.64.64.62 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797882 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58763080-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ccfaf383ebf650693ffc0ecbfad6a0a8afccd1d --- /dev/null +++ b/graph/incidents_graphml/5/587a2d80-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,711 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.20 + 100.64.77.20 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.45 + USER-0015-1748.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.21 + 100.64.77.21 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.22 + 100.64.77.22 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.72 + 100.64.72.72 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.23 + 100.64.77.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.24 + 100.64.77.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.20 + 100.64.73.20 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.42.128 + 100.64.42.128 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.214 + 100.64.72.214 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.45.196 + 100.64.45.196 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.25 + 100.64.77.25 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.26 + 100.64.77.26 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.27 + 100.64.77.27 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.28 + 100.64.77.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761949 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587a2d80-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7056e2ca4a4ca74ed47185fa26646a51bc41a0fe --- /dev/null +++ b/graph/incidents_graphml/5/587cea80-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 587cea80-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b87b7b34d47ac6d21b248a62a7fba02f3b65833 --- /dev/null +++ b/graph/incidents_graphml/5/587cee50-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.41 + 100.64.54.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + HOST-17780 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1699190968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 587cee50-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e731982d2f34a9f9f8ef8db1e4c4040073d5e879 --- /dev/null +++ b/graph/incidents_graphml/5/587fb140-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.143 + 100.64.47.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725436 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 587fb140-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1c2b6a502932886dd6ca6ce9605e8dd9a568c7b --- /dev/null +++ b/graph/incidents_graphml/5/58820680-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.89 + 100.64.40.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58820680-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..283e332aeaca2c6d07f13cc5c257fcc2d82fef1b --- /dev/null +++ b/graph/incidents_graphml/5/588558f0-28c0-11ee-9c7b-cd7423cdcafa.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.144 + 100.64.68.144 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.31 + 100.64.11.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588558f0-28c0-11ee-9c7b-cd7423cdcafa + + + diff --git a/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8816f6e1dfab4a540903d9eb07770a757c39e3a3 --- /dev/null +++ b/graph/incidents_graphml/5/5885e7f0-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.62 + 100.64.64.62 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797882 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5885e7f0-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f6d93cde02ebbba894fc5d5d568152d77598210 --- /dev/null +++ b/graph/incidents_graphml/5/588bbb60-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + HOST-17780 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.54.41 + 100.64.54.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1699190968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 588bbb60-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df4b333b60151741ec69ca4156c07ce575837d70 --- /dev/null +++ b/graph/incidents_graphml/5/588ed7c0-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.205 + 100.64.49.205 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 588ed7c0-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4a74a512b9ff7e47a1e1e6332646877f9650117 --- /dev/null +++ b/graph/incidents_graphml/5/58918670-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321632 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 58918670-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5469e4291607a4283577fac8800f2dee60e46ca3 --- /dev/null +++ b/graph/incidents_graphml/5/589438f0-242a-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.24 + 100.64.45.24 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.178 + 100.64.61.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.179 + 100.64.61.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.180 + 100.64.61.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.181 + 100.64.61.181 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.228 + 100.64.41.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589438f0-242a-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe310a7d1e6cfd343d05668075d5cb8dfe73765f --- /dev/null +++ b/graph/incidents_graphml/5/5895f860-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.143 + 100.64.47.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725436 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5895f860-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..247a97fba82bffd8adf93f0bf42cc11da8a130da --- /dev/null +++ b/graph/incidents_graphml/5/589e1a00-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.205 + 100.64.49.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 589e1a00-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0025aba99d04a82f4e65da8b55abe153b3aec7aa --- /dev/null +++ b/graph/incidents_graphml/5/589f4c30-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.15 + USER-0015-1963.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 589f4c30-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24fb6e21b90870ff090dbedcf57159297d3fa367 --- /dev/null +++ b/graph/incidents_graphml/5/58a2c480-58ae-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.40 + 100.64.66.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695321633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 58a2c480-58ae-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dce728bdbb14b03ad411a27cd1803a711726bb9 --- /dev/null +++ b/graph/incidents_graphml/5/58a3f060-242a-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.144 + 100.64.46.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.186 + 100.64.61.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.187 + 100.64.61.187 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.188 + 100.64.61.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.189 + 100.64.61.189 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.105 + 100.64.20.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.187 + 100.64.37.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.190 + 100.64.61.190 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.191 + 100.64.61.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.192 + 100.64.61.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.193 + 100.64.61.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.194 + 100.64.61.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.195 + 100.64.61.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.120 + 100.64.5.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.40.227 + 100.64.40.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.196 + 100.64.61.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58a3f060-242a-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cf0e9a6665845f234a4ad6337e85cd8dc9b7553 --- /dev/null +++ b/graph/incidents_graphml/5/58a95950-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.156 + 100.64.22.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725436 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58a95950-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..904bbea3dffb4b6dbcceae613faf235859f44f85 --- /dev/null +++ b/graph/incidents_graphml/5/58aaeb40-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58aaeb40-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0cd715b6f1be835b1cc2b1950eae34d3c142e13 --- /dev/null +++ b/graph/incidents_graphml/5/58ab5780-28c0-11ee-9c7b-cd7423cdcafa.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.161 + 100.64.70.161 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.144 + 100.64.68.144 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.31 + 100.64.11.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ab5780-28c0-11ee-9c7b-cd7423cdcafa + + + diff --git a/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cd9c04a1aef3c8872a6a701fed8b36f3224ab4b --- /dev/null +++ b/graph/incidents_graphml/5/58ab96e0-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.163 + USER-0015-1762.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + 100.64.1.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.83.6 + 100.64.83.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662136997 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ab96e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136997 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ab96e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136997 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ab96e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136997 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ab96e0-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..754048dc55e2e960a144424cd200a68be5760487 --- /dev/null +++ b/graph/incidents_graphml/5/58adc550-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.195 + 100.64.31.195 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 58adc550-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70951630051027fdb182a51b31c14491535ce80f --- /dev/null +++ b/graph/incidents_graphml/5/58b19bb0-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.25 + 100.64.20.25 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58b19bb0-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03d38ea58bfdce15a43c8a0652d84e0a68c0bbc0 --- /dev/null +++ b/graph/incidents_graphml/5/58b38240-5aaf-11ee-892e-3b87e68adb1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.238 + 100.64.36.238 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1695541964 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58b38240-5aaf-11ee-892e-3b87e68adb1a + + + diff --git a/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..937ccb0326f4ae698326a821562e4c960eee81b6 --- /dev/null +++ b/graph/incidents_graphml/5/58b5f340-5aaf-11ee-892e-3b87e68adb1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1695541964 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58b5f340-5aaf-11ee-892e-3b87e68adb1a + + + diff --git a/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66d84f81b70a1a45080f9562e64cfefc502d4b68 --- /dev/null +++ b/graph/incidents_graphml/5/58b83d30-5aaf-11ee-892e-3b87e68adb1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695541964 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58b83d30-5aaf-11ee-892e-3b87e68adb1a + + + diff --git a/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30f7efb70c320883356179793057dada128761d0 --- /dev/null +++ b/graph/incidents_graphml/5/58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.113 + 100.64.85.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673515225 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58b9d8c0-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c23c496aa2cd33d5fad26b44ff595eb4368cb8b --- /dev/null +++ b/graph/incidents_graphml/5/58ba0430-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.154 + USER-0015-1947.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ba0430-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d573ef3e22376de8991734a8edee788f7945c3d9 --- /dev/null +++ b/graph/incidents_graphml/5/58ba7ba0-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58ba7ba0-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ad75acb822bbba2877707081c759ffd57d6278d --- /dev/null +++ b/graph/incidents_graphml/5/58bbcf10-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.195 + 100.64.31.195 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 58bbcf10-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cb82cef8d91c7661cc2e2f21573767be26d0709 --- /dev/null +++ b/graph/incidents_graphml/5/58bda4a0-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.156 + 100.64.22.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725436 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58bda4a0-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69a72e69ad4876be1851518bceed7c8e93bff17a --- /dev/null +++ b/graph/incidents_graphml/5/58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.113 + 100.64.85.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673515225 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58be6ca0-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a4248322bb4fe5504a4cb3ed45a1d1d9e2099c4 --- /dev/null +++ b/graph/incidents_graphml/5/58c10500-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.20.25 + 100.64.20.25 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58c10500-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1eed7c2a561341e5058af35759417d77c97aefab --- /dev/null +++ b/graph/incidents_graphml/5/58c3d470-242a-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.88 + 100.64.55.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.208 + 100.64.61.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.209 + 100.64.61.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.202 + 100.64.11.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.58 + 100.64.25.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.210 + 100.64.61.210 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.211 + 100.64.61.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.193 + 100.64.28.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.212 + 100.64.61.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.213 + 100.64.61.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + INCIDENT_LINK + 1717694976 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58c3d470-242a-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec75026509c01d28b24d6b87cef8e13f4994516b --- /dev/null +++ b/graph/incidents_graphml/5/58c79b00-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.245 + 100.64.19.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58c79b00-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..958a36ebaf9bcacc4f1346037fc8fb5fd0fd28a3 --- /dev/null +++ b/graph/incidents_graphml/5/58c99490-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.154 + USER-0015-1947.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58c99490-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daaaa07865aad5aaf6d013f5741647cd2359bbbb --- /dev/null +++ b/graph/incidents_graphml/5/58cbd4a0-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.239 + USER-0015-1344.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58cbd4a0-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa2328dd92b9fc9c4d4f6792adfe7a876163e4b1 --- /dev/null +++ b/graph/incidents_graphml/5/58d47600-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,827 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.214 + 100.64.60.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.215 + 100.64.60.215 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.216 + 100.64.60.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.217 + 100.64.60.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.218 + 100.64.60.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.45 + 100.64.28.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.135 + 100.64.23.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.225 + 100.64.4.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.84 + 100.64.8.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.250 + 100.64.25.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.219 + 100.64.60.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456592 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58d47600-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8413bd1a014d3bfe939dc82294c1b757fe7f8a71 --- /dev/null +++ b/graph/incidents_graphml/5/58d50230-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58d50230-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f85aef4b58f36ea26cec32787b26c83f8831a2a --- /dev/null +++ b/graph/incidents_graphml/5/58d5f2e0-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.245 + 100.64.19.245 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58d5f2e0-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4211248af6ebb61d9799a435efbb4008655aac0 --- /dev/null +++ b/graph/incidents_graphml/5/58db16e0-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.239 + USER-0015-1344.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58db16e0-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8649c26aa9ce37701d4ebcbb36650682331d7e07 --- /dev/null +++ b/graph/incidents_graphml/5/58de5510-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58de5510-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml b/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a35514d94511fd0d68f11d3ec356ea76d1334367 --- /dev/null +++ b/graph/incidents_graphml/5/58e29d10-8858-11ee-9c47-2b6116201e48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700562352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58e29d10-8858-11ee-9c47-2b6116201e48 + + + diff --git a/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5643515cd1a2a966d8292173eeb0c8b7ff197546 --- /dev/null +++ b/graph/incidents_graphml/5/58e83c10-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58e83c10-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3d3ea67622f27242bc0e06f4851981953f2800d --- /dev/null +++ b/graph/incidents_graphml/5/58ea5920-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.241 + 100.64.44.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58ea5920-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bec6f2a51e12b1693bd630b16a363cadc37172e2 --- /dev/null +++ b/graph/incidents_graphml/5/58eacb50-7bdf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.189 + 100.64.89.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699190969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58eacb50-7bdf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9836c5e9369597ae2cd7f95ac736b495a2f1ee60 --- /dev/null +++ b/graph/incidents_graphml/5/58f140d0-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 58f140d0-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dce05c28f64daf6d2ae1f7e014b983454ebb0b46 --- /dev/null +++ b/graph/incidents_graphml/5/58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.19 + USER-0015-1964.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58f5d0a0-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e25417de7f560903139c92bc4ad6510e72705891 --- /dev/null +++ b/graph/incidents_graphml/5/58f86a80-9ad9-11ee-a153-0bcaae5115e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.184 + 100.64.17.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702596878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 58f86a80-9ad9-11ee-a153-0bcaae5115e2 + + + diff --git a/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afb89a44044be91d84640f0c860288feb23263ea --- /dev/null +++ b/graph/incidents_graphml/5/58f9ab70-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.112 + USER-0015-1339.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011169 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58f9ab70-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..060888c7b3eb41bbb88b497c57133926471f09b3 --- /dev/null +++ b/graph/incidents_graphml/5/58fe1580-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.62 + 100.64.51.62 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936375 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 58fe1580-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..508f6e9564150f3d6396abe8da04e99fb8116d57 --- /dev/null +++ b/graph/incidents_graphml/5/5900f840-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.51 + USER-0015-1948.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5900f840-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a4439b1e9d8e9b858c957420bf4c71a1f4618e5 --- /dev/null +++ b/graph/incidents_graphml/5/590821f0-9ad9-11ee-a153-0bcaae5115e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.184 + 100.64.17.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702596878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 590821f0-9ad9-11ee-a153-0bcaae5115e2 + + + diff --git a/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06661518cd00fc877f175d85304023cf3a15a479 --- /dev/null +++ b/graph/incidents_graphml/5/590a2d20-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.118 + 100.64.41.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 590a2d20-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..490b2d7e6d8d64dfaf5f105fd50980108e84cd3b --- /dev/null +++ b/graph/incidents_graphml/5/590c5b60-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.29 + 100.64.77.29 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.13 + 100.64.74.13 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.30 + 100.64.77.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665761950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 590c5b60-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cd758d5808607e8b94e29ba91b1b76eb8462573 --- /dev/null +++ b/graph/incidents_graphml/5/59101370-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.34.51 + USER-0015-1948.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59101370-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..791e291661f51e7a8801c6df2fc8013a7360b559 --- /dev/null +++ b/graph/incidents_graphml/5/5911e420-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.20 + 100.64.84.20 + ["Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5911e420-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..def33da260ad4a1834c48582c58f08a75eabac97 --- /dev/null +++ b/graph/incidents_graphml/5/591dd980-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.0.111 + 100.64.0.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 192.168.89.158 + 192.168.89.158 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660006694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 591dd980-177e-11ed-b397-31ec3715e69d + + + INCIDENT_LINK + 1660006694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 591dd980-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f32937b1e8286c18fa9d9c65a5756e07a7584eb3 --- /dev/null +++ b/graph/incidents_graphml/5/59204010-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.162 + 100.64.83.162 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59204010-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2425e8b7a95f8df3293d6266131db401330191b2 --- /dev/null +++ b/graph/incidents_graphml/5/5925efd0-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660006694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5925efd0-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526bc4846fc28e04d3e0b91734d6e868220861f8 --- /dev/null +++ b/graph/incidents_graphml/5/59272d90-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59272d90-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml b/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7ff854f831829f4cdfcc965f1626647748f7c14 --- /dev/null +++ b/graph/incidents_graphml/5/592c9810-4cf4-11ee-8f16-29e9aef3faf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.113 + 100.64.10.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.1.231.219 + 10.1.231.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1694032284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 592c9810-4cf4-11ee-8f16-29e9aef3faf6 + + + diff --git a/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6aaa345bafec365fc38e0173515e3aad392bd62 --- /dev/null +++ b/graph/incidents_graphml/5/592e5440-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.201 + 100.64.77.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660006694 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 592e5440-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09f602962fa6f5c4aca26143f129cd07595d32f9 --- /dev/null +++ b/graph/incidents_graphml/5/593575c0-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.162 + 100.64.83.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292061 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 593575c0-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5b4200d068aa9f2636b0e24898e8f69c3eccfb5 --- /dev/null +++ b/graph/incidents_graphml/5/5938ec10-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522971 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5938ec10-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c43a17f259c0b9a8e7616a0cb56e16921a3e04c --- /dev/null +++ b/graph/incidents_graphml/5/59490830-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.239 + 100.64.82.239 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660006694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59490830-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5ceabdbcd1abf8ec1e38e9de1bb576d55f84a37 --- /dev/null +++ b/graph/incidents_graphml/5/594a0310-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522971 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 594a0310-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8728ac41dc0bce45ef31dbdce2086711d1af3f4 --- /dev/null +++ b/graph/incidents_graphml/5/594f97e0-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.239 + 100.64.82.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660006695 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 594f97e0-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21142bcad058230d67c898d1e2fccb7e66c1d302 --- /dev/null +++ b/graph/incidents_graphml/5/594fab70-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.48 + 100.64.19.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725437 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 594fab70-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4457bd83fa09b04765bb8a9bd73ceb6d87002080 --- /dev/null +++ b/graph/incidents_graphml/5/59526db0-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.17 + 100.64.32.17 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59526db0-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17b5c09917f42ee3f7c9fcacbd51b2bb2a385123 --- /dev/null +++ b/graph/incidents_graphml/5/59551620-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.240 + USER-0015-1935.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.252 + 100.64.71.252 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59551620-177e-11ed-b397-31ec3715e69d + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59551620-177e-11ed-b397-31ec3715e69d + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59551620-177e-11ed-b397-31ec3715e69d + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59551620-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml b/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a712e3e92350d05b59495db8629653959eb0271 --- /dev/null +++ b/graph/incidents_graphml/5/595e9f90-0928-11ef-b19d-8b7251a5657d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.48 + 100.64.19.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714725437 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 595e9f90-0928-11ef-b19d-8b7251a5657d + + + diff --git a/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6c54ebf6c7cedc976c03df80c7c85da7423a58f --- /dev/null +++ b/graph/incidents_graphml/5/595eb310-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.244 + USER-0015-1936.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660006695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595eb310-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml b/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8496121e224d74055668c94938c69f75e3fcc79b --- /dev/null +++ b/graph/incidents_graphml/5/595ef010-28c0-11ee-9c7b-cd7423cdcafa.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.144 + 100.64.68.144 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.31 + 100.64.11.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + INCIDENT_LINK + 1690051709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 595ef010-28c0-11ee-9c7b-cd7423cdcafa + + + diff --git a/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6671b945be0a05db99b647383c541ea263715f8d --- /dev/null +++ b/graph/incidents_graphml/5/59644800-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.17 + 100.64.32.17 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59644800-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5552113666f19d9dcd9e0bf03418ae5c69743783 --- /dev/null +++ b/graph/incidents_graphml/5/5967b3c0-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.244 + USER-0015-1936.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660006695 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5967b3c0-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f82458b774a17293eda1166a436a7a48826db25e --- /dev/null +++ b/graph/incidents_graphml/5/596dc740-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.64 + 100.64.51.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936375 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 596dc740-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1e231e7d9b621664ce112416d7091fe8a8a1ae6 --- /dev/null +++ b/graph/incidents_graphml/5/596eb460-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.114 + 100.64.43.114 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011170 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 596eb460-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bd1aed50e1c4df3beabb39702107071b4f9065e --- /dev/null +++ b/graph/incidents_graphml/5/5970a170-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.133 + 100.64.47.133 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335246 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5970a170-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml b/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaa57de7db8d94274d4061ce79562cd6dfe63d7e --- /dev/null +++ b/graph/incidents_graphml/5/59756f60-177e-11ed-b397-31ec3715e69d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.241 + 100.64.82.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.242 + 100.64.82.242 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59756f60-177e-11ed-b397-31ec3715e69d + + + INCIDENT_LINK + 1660006695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59756f60-177e-11ed-b397-31ec3715e69d + + + diff --git a/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a33d351c37427b6cee0cc270ef47d40da6f409d8 --- /dev/null +++ b/graph/incidents_graphml/5/59764f50-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.164 + USER-0015-1949.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292061 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59764f50-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d20e06a8950de18b58d53e7e3396ed5a8bc79bb --- /dev/null +++ b/graph/incidents_graphml/5/597e86e0-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.33 + 100.64.44.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 597e86e0-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d80da6f7be583f84433a9bcb6a45b06d36a01c5d --- /dev/null +++ b/graph/incidents_graphml/5/597fa190-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.64 + 100.64.51.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936375 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 597fa190-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a78fd8dd65e585e180764d4e3dfab03203d2a21 --- /dev/null +++ b/graph/incidents_graphml/5/5989a7b0-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.135 + 100.64.47.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335246 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5989a7b0-61e6-11ee-b713-27a48af32cd1 + + + INCIDENT_LINK + 1696335246 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5989a7b0-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbe45580d544fefb6968202cae12f13844b2f5a1 --- /dev/null +++ b/graph/incidents_graphml/5/598fc4f0-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.33 + 100.64.44.33 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005829 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 598fc4f0-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml b/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6711048d885909a1f1ef9bed0a6ad64e4aa05a54 --- /dev/null +++ b/graph/incidents_graphml/5/5992d800-18bf-11ee-9538-c5149dbd1e2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.86.174 + 10.102.86.174 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.164 + USER-0015-1949.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1688292061 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5992d800-18bf-11ee-9538-c5149dbd1e2e + + + diff --git a/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml b/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac1c930cdb05d5528b77160e1b4df9f910913800 --- /dev/null +++ b/graph/incidents_graphml/5/5997d040-f236-11ec-9232-17ec7cc98ff9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.46 + 100.64.21.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5997d040-f236-11ec-9232-17ec7cc98ff9 + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5997d040-f236-11ec-9232-17ec7cc98ff9 + + + diff --git a/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0c6cdfcdbf99a5b0cde5cac9f1e85a163c88f53 --- /dev/null +++ b/graph/incidents_graphml/5/599feed0-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.135 + 100.64.47.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335246 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 599feed0-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml b/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cf98f70c0de5230c27f65c8ff5c892b70071042 --- /dev/null +++ b/graph/incidents_graphml/5/59a0d0f0-f236-11ec-9232-17ec7cc98ff9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.25.246 + USER-0015-1945.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.0.105 + 100.64.0.105 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 192.168.77.168 + 192.168.77.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Windows Active Directory"] + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59a0d0f0-f236-11ec-9232-17ec7cc98ff9 + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59a0d0f0-f236-11ec-9232-17ec7cc98ff9 + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59a0d0f0-f236-11ec-9232-17ec7cc98ff9 + + + INCIDENT_LINK + 1655907578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59a0d0f0-f236-11ec-9232-17ec7cc98ff9 + + + diff --git a/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6fa5116ef6f71777461dedc04145e9ca71f3b92 --- /dev/null +++ b/graph/incidents_graphml/5/59ab0c90-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447373 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59ab0c90-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fb59860f287ba5dcb026ab5cdd04e00464ce77e --- /dev/null +++ b/graph/incidents_graphml/5/59adcd00-dd62-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.64 + 100.64.96.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.8.203 + USER-0015-2148.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.83 + 100.64.47.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.43.217 + 100.64.43.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.105 + 100.64.17.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.255 + 100.64.93.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.58.223 + 100.64.58.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.72.89 + 100.64.72.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.237 + 100.64.44.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.65 + 100.64.96.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.186 + 100.64.48.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.66 + 100.64.96.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.245 + 100.64.65.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.67 + 100.64.96.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.31.60 + 100.64.31.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.68 + 100.64.96.68 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.157 + USER-0015-2038.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.69 + 100.64.96.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + INCIDENT_LINK + 1709912497 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59adcd00-dd62-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26774b28253997b51e269553c71c7b01364b0753 --- /dev/null +++ b/graph/incidents_graphml/5/59b40f20-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.202 + 100.64.11.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744800 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59b40f20-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c64ec25e707c8f09117338f8280cf46c6dc7ce81 --- /dev/null +++ b/graph/incidents_graphml/5/59c44b10-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.42 + 100.64.59.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831253 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59c44b10-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25a7828af9cbb7fa8691b819c1235f1261cee087 --- /dev/null +++ b/graph/incidents_graphml/5/59cee030-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.107.86 + 172.16.107.86 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.91.162 + 100.64.91.162 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.163 + 100.64.91.163 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59cee030-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59cee030-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59cee030-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59cee030-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cc3510b7869caa4cacb63d45942a5f438a0952c --- /dev/null +++ b/graph/incidents_graphml/5/59d62560-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.42 + 100.64.59.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831253 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59d62560-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dff6c83526eac0421b6965ced558d67bb0f24c23 --- /dev/null +++ b/graph/incidents_graphml/5/59d74cb0-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.43 + 100.64.23.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 59d74cb0-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..030a72c7c2ef133e9c21e803a9ce914f67cd4ab1 --- /dev/null +++ b/graph/incidents_graphml/5/59da9150-121a-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.165 + 100.64.33.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687561488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59da9150-121a-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2db3b1e7eb10bcc475c4b554a7824c7c03a8426b --- /dev/null +++ b/graph/incidents_graphml/5/59dc6a50-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,793 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.116 + 100.64.43.116 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.117 + 100.64.43.117 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.118 + 100.64.43.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.119 + 100.64.43.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.93 + 100.64.33.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.115 + 100.64.33.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.120 + 100.64.43.120 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.121 + 100.64.43.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.123 + 100.64.43.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 59dc6a50-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a7a6300996441a6d3c179d26835c2f55a099790 --- /dev/null +++ b/graph/incidents_graphml/5/59e1ab70-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59e1ab70-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a110e0020eada1c2b9961b90b46e3eddb55fc6d --- /dev/null +++ b/graph/incidents_graphml/5/59e93750-121a-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.165 + 100.64.33.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687561488 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59e93750-121a-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb290789652dfc945e40ebddfc4f0884fbddd1c2 --- /dev/null +++ b/graph/incidents_graphml/5/59efdc40-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458755 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 59efdc40-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml b/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..881848842b7dbcb1434960c512a160fe3c983b7a --- /dev/null +++ b/graph/incidents_graphml/5/59f0ef30-07f8-11ee-8547-1367d9432c3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.51 + 100.64.23.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686447373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 59f0ef30-07f8-11ee-8547-1367d9432c3e + + + diff --git a/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f712da7f3113695021a82d6ebefb4af9190bfd5 --- /dev/null +++ b/graph/incidents_graphml/5/59fe1310-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.237 + 100.64.44.237 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 59fe1310-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b272eb94eb99aaabdc929f0606c901170f2940a --- /dev/null +++ b/graph/incidents_graphml/5/5a04cde0-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.35 + 100.64.44.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005830 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a04cde0-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc8e8c6aa83b40b4c5c0ce988a25305d476757a5 --- /dev/null +++ b/graph/incidents_graphml/5/5a0954b0-10b5-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,81 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + FILE + ["Phishing Email","Malicious File"] + 0.90625 + ["ProofPoint Protect"] + + + HOST + 100.64.68.57 + 100.64.68.57 + ["Phishing Site","Exploiting Target"] + 0.947265625 + ["Precinct","ProofPoint Protect","PAN NGFW"] + + + FILE + ["Phishing Email","Malicious File"] + 0.90625 + ["ProofPoint Protect"] + + + INCIDENT_LINK + 1687408158 + malicious + 0.947265625 + 0.947265625 + Data Theft + ["T1566","T1204","T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Phishing Email","Malicious File","Phishing Site","Exploiting Target"] + complete-mission + Disrupted + 5a0954b0-10b5-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408158 + malicious + 0.947265625 + 0.947265625 + Data Theft + ["T1566","T1204","T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Phishing Email","Malicious File","Phishing Site","Exploiting Target"] + complete-mission + Disrupted + 5a0954b0-10b5-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b5320ab0711081baccb50f2ef38827f5d7e1d6c --- /dev/null +++ b/graph/incidents_graphml/5/5a0fc650-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.241 + 100.64.44.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a0fc650-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adc2cf3d70d7d54a553a781bd8be8f6c69a8d742 --- /dev/null +++ b/graph/incidents_graphml/5/5a1177d0-6092-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.18.41 + 100.64.18.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696189218 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a1177d0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189218 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a1177d0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189218 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a1177d0-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189218 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a1177d0-6092-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63518bcd745ccdb4082237a588049e45b029fc59 --- /dev/null +++ b/graph/incidents_graphml/5/5a1342c0-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.180 + 100.64.51.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a1342c0-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34e99a199e91e272f729ebc66979b2bfcbd0bcb9 --- /dev/null +++ b/graph/incidents_graphml/5/5a1b3c10-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.35 + 100.64.44.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a1b3c10-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml b/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1070bfe4761933b9c483ed6d685d49004699b9f --- /dev/null +++ b/graph/incidents_graphml/5/5a213620-1354-11ed-8dba-c3c980000fe0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.150 + 100.64.77.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659548852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a213620-1354-11ed-8dba-c3c980000fe0 + + + diff --git a/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0124d7956d03239d1eb3b6356b2baa4f44fccd01 --- /dev/null +++ b/graph/incidents_graphml/5/5a228500-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.180 + 100.64.51.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458755 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a228500-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdfc345f62ffe20cb0379673260221126e16b833 --- /dev/null +++ b/graph/incidents_graphml/5/5a277d20-0938-11ee-a886-17db84346526.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.183 + 100.64.7.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.94 + 100.64.57.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.95 + 100.64.57.95 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.67 + 100.64.7.67 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.96 + 100.64.57.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a277d20-0938-11ee-a886-17db84346526 + + + diff --git a/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abe7958f8c928372443a47115c3840893a677753 --- /dev/null +++ b/graph/incidents_graphml/5/5a279260-00b8-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.163 + 100.64.70.163 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.164 + 100.64.70.164 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713797725 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a279260-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797725 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a279260-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797725 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a279260-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797725 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a279260-00b8-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cabc002a5fccab6358867f08c2a127b327188893 --- /dev/null +++ b/graph/incidents_graphml/5/5a280940-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.241 + 100.64.44.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908362 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a280940-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7cd9ac340e2364b04ebdd6ba0b91c59d1d18008 --- /dev/null +++ b/graph/incidents_graphml/5/5a2cca90-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.48 + 100.64.18.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032750 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a2cca90-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29e197b4cdf2ff1adab16659a6961d600838acd3 --- /dev/null +++ b/graph/incidents_graphml/5/5a30b5d0-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.184 + 100.64.51.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a30b5d0-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcf5253616ad6dc00d00f8d22deb07128dc40d2a --- /dev/null +++ b/graph/incidents_graphml/5/5a358520-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.98 + 100.64.21.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + 100.64.71.21 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.129 + 100.64.82.129 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670151409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a358520-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a358520-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a358520-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a358520-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65016dcd221474418703dcd3bd6c7724750468c0 --- /dev/null +++ b/graph/incidents_graphml/5/5a3f0db0-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.184 + 100.64.51.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a3f0db0-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37205c214c94ce07e3eb5a0b19ade081171fe5cc --- /dev/null +++ b/graph/incidents_graphml/5/5a484720-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.197 + 100.64.56.197 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a484720-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68f6151a7cc52da648b58cee2b696da0c31acd0a --- /dev/null +++ b/graph/incidents_graphml/5/5a4aa670-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.186 + 100.64.51.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a4aa670-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55e284eb9b213bb0b64d2d8d6c11df3868cc5f7a --- /dev/null +++ b/graph/incidents_graphml/5/5a520180-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841264 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a520180-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28c2c662d00df58ac45728cadf7c223972bed4c3 --- /dev/null +++ b/graph/incidents_graphml/5/5a578dc0-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a578dc0-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml b/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87f8c9957662da6fcbc0a66193eece334f080971 --- /dev/null +++ b/graph/incidents_graphml/5/5a57c5d0-2204-11ef-b592-0939f15f5fe2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.186 + 100.64.51.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717458756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a57c5d0-2204-11ef-b592-0939f15f5fe2 + + + diff --git a/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml b/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8010b3b1d2db7974e7dc8e145502060aa106b1f5 --- /dev/null +++ b/graph/incidents_graphml/5/5a59f650-9ad9-11ee-a153-0bcaae5115e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.159 + 100.64.62.159 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702596881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a59f650-9ad9-11ee-a153-0bcaae5115e2 + + + diff --git a/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d545a4ed186157ce8853612c9e7ac3ca1d539704 --- /dev/null +++ b/graph/incidents_graphml/5/5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.105 + 100.64.28.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a5f4800-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6344226de7032c95f193cc40ede03f1c1247bf2f --- /dev/null +++ b/graph/incidents_graphml/5/5a638010-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.7 + 100.64.83.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662137000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a638010-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662137000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a638010-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..615cc1a473441574013c775ed75a03b011ddf6ec --- /dev/null +++ b/graph/incidents_graphml/5/5a6ae290-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.63 + 100.64.5.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a6ae290-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae2bf55e30a13c2249520fc4358f71ade00f140b --- /dev/null +++ b/graph/incidents_graphml/5/5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.197 + 100.64.27.197 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a7233c0-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..396f300cf188560bdaf377ad53f59572ecc4cf1f --- /dev/null +++ b/graph/incidents_graphml/5/5a7d3210-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.63 + 100.64.5.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a7d3210-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0a725f0dd3af0cd6ce031c6e69e237d6391d9de --- /dev/null +++ b/graph/incidents_graphml/5/5a7f3240-ea51-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.60 + 100.64.69.60 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.69.61 + 100.64.69.61 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.31.69 + 100.64.31.69 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334562 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a7f3240-ea51-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ec779f6228daf848dfcdc1cdc88ec3872132802 --- /dev/null +++ b/graph/incidents_graphml/5/5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.102 + 100.64.4.102 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5a7fa140-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7168e1438d479cfc4555f74bb48e43801edc0f4 --- /dev/null +++ b/graph/incidents_graphml/5/5a859150-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a859150-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a859150-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac75e0a5947194290fc8905c2531008527b1a768 --- /dev/null +++ b/graph/incidents_graphml/5/5a8c0b40-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.132 + 100.64.43.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a8c0b40-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e4049d740b949c089a04b46082631bc5b5ac599 --- /dev/null +++ b/graph/incidents_graphml/5/5a8cc270-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.58 + 100.64.41.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5a8cc270-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..157656cb839baaecf5b492ce3af90cff3cf05b6f --- /dev/null +++ b/graph/incidents_graphml/5/5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.102 + 100.64.4.102 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a8dab00-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d19d63293be538ced80ac06adc56aeabaf2e173 --- /dev/null +++ b/graph/incidents_graphml/5/5a8e3c20-04d9-11ef-9f37-4184b1db151c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.197 + 100.64.39.197 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714251704 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a8e3c20-04d9-11ef-9f37-4184b1db151c + + + diff --git a/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8f34ce4650f7af63e01a3554bda654177410031 --- /dev/null +++ b/graph/incidents_graphml/5/5a9a1c90-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.109 + 100.64.85.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1720774901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a9a1c90-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f0df1563220700f9e0fb4e7cf108525ef2889a3 --- /dev/null +++ b/graph/incidents_graphml/5/5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.102 + 100.64.24.102 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5a9b3f90-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f11e463cc94139b643f6ad43e9f5154c6ed0622 --- /dev/null +++ b/graph/incidents_graphml/5/5a9e2790-ef15-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.58 + 100.64.41.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711858548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5a9e2790-ef15-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75be2b9d621e675bc5f73dfce4f65b0e447cd052 --- /dev/null +++ b/graph/incidents_graphml/5/5aace870-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.178 + 100.64.81.178 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659286001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5aace870-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659286001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5aace870-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b12bad239e0a7d0ccff816b9e0d6caafe3ec93ff --- /dev/null +++ b/graph/incidents_graphml/5/5aae0440-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.102 + 100.64.24.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aae0440-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0b3c4e44ef72068944583ec61a7d472a87fb46a --- /dev/null +++ b/graph/incidents_graphml/5/5ab2d4b0-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.109 + 100.64.85.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774901 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ab2d4b0-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..281a3c8c086fcbb77d6f112f5c0a42703ced22bb --- /dev/null +++ b/graph/incidents_graphml/5/5ab53f90-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.142 + 100.64.20.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715871337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ab53f90-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98cce60f7b99afbdeb2a4e9f365d35304c6894ce --- /dev/null +++ b/graph/incidents_graphml/5/5ab68560-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.179 + 100.64.81.179 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659286001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ab68560-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659286001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ab68560-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ce767ec34cc0e9f8b806118082067df9cfe3ab3 --- /dev/null +++ b/graph/incidents_graphml/5/5abacb20-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.180 + 100.64.81.180 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.109 + 100.64.1.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659286001 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5abacb20-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659286001 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5abacb20-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19367ba3337c57d9ead3f2619df5e359ef0aa549 --- /dev/null +++ b/graph/incidents_graphml/5/5abc62a0-397f-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.129 + 100.64.59.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.130 + 100.64.59.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040461 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5abc62a0-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040461 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5abc62a0-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040461 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5abc62a0-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040461 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5abc62a0-397f-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cca0aef90f2327da0495e7c68e1464ff4cec0519 --- /dev/null +++ b/graph/incidents_graphml/5/5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.200 + 100.64.72.200 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.31 + 100.64.77.31 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665761953 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761953 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761953 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761953 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac507e0-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfa3833069150b7a6d484f4a9f8030747aebb1cd --- /dev/null +++ b/graph/incidents_graphml/5/5ac5dff0-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.132 + 100.64.43.132 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011172 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ac5dff0-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..733327a043bff44bc31cd134fc127e81c2ca7b65 --- /dev/null +++ b/graph/incidents_graphml/5/5ac7e160-85f3-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,351 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.82 + 100.64.40.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.22 + 100.64.43.22 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.23 + 100.64.43.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.78 + 100.64.30.78 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.103 + 100.64.27.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.24 + 100.64.43.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.25 + 100.64.43.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.26 + 100.64.43.26 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.233 + 100.64.36.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299074 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ac7e160-85f3-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1a3e434f8f81065de49a1b041a3884d4eee3b1b --- /dev/null +++ b/graph/incidents_graphml/5/5ad0a6a0-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.137 + 100.64.47.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ad0a6a0-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56426a06aa6693c9b1a32c220aa26468d90ea48f --- /dev/null +++ b/graph/incidents_graphml/5/5ad0b680-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.37 + 100.64.47.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ad0b680-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae9d126ac69230848dc4373c7ebe9d543a47332b --- /dev/null +++ b/graph/incidents_graphml/5/5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.201 + 100.64.26.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522973 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ad955a0-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14b0b041e45b290415a9afa553e7cf5c5182ccba --- /dev/null +++ b/graph/incidents_graphml/5/5ae34440-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.137 + 100.64.47.137 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335249 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ae34440-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f3ab3027fad706149597498b0abba2b7109e5f4 --- /dev/null +++ b/graph/incidents_graphml/5/5ae3ce00-3587-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.225 + 100.64.60.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.226 + 100.64.60.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.204 + 100.64.56.204 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.227 + 100.64.60.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.228 + 100.64.60.228 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.229 + 100.64.60.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.231 + 100.64.26.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.238 + 100.64.19.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + INCIDENT_LINK + 1691456595 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae3ce00-3587-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2f37b61677ce47a651c81b8168abdd9480884ab --- /dev/null +++ b/graph/incidents_graphml/5/5ae46760-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.203 + 100.64.81.203 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661506070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae46760-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae46760-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae46760-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ae46760-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..583f4d4762eaf1f86c9e764d3290776087f2638f --- /dev/null +++ b/graph/incidents_graphml/5/5ae59e10-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.39 + 100.64.47.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ae59e10-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ae59e10-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..399aed983b73fe8e74c2ae13967c163228334aa1 --- /dev/null +++ b/graph/incidents_graphml/5/5aea4590-7ee4-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.201 + 100.64.26.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699522973 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5aea4590-7ee4-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml b/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68b7850d692a6cd77ca602367a3ebb7e3f44b6cd --- /dev/null +++ b/graph/incidents_graphml/5/5aee2b60-2521-11ed-8e05-13976c823138.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.36 + 100.64.73.36 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.204 + 100.64.81.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.205 + 100.64.81.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + INCIDENT_LINK + 1661506070 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5aee2b60-2521-11ed-8e05-13976c823138 + + + diff --git a/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..879054480db59e31969358d3b5ef068d384b5284 --- /dev/null +++ b/graph/incidents_graphml/5/5aee46f0-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.165 + 100.64.39.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5aee46f0-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c65d3264e9c50403229781f9445a234db9947572 --- /dev/null +++ b/graph/incidents_graphml/5/5af06470-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.88 + 100.64.43.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388375 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5af06470-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56312ab66edfbdc8091f81fcd983af0d1f867127 --- /dev/null +++ b/graph/incidents_graphml/5/5af3dab0-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.73 + 100.64.39.73 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797886 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5af3dab0-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..737bfd3f9250bb8bddc9672f8fcc84173b2a7bf6 --- /dev/null +++ b/graph/incidents_graphml/5/5af4e050-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.39 + 100.64.47.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5af4e050-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97b10485ebeb755e9f1b08e9af6e2a226a7eee09 --- /dev/null +++ b/graph/incidents_graphml/5/5afd7df0-2f9c-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,133 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.142 + 100.64.68.142 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1690805908 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 5afd7df0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805908 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 5afd7df0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805908 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 5afd7df0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805908 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 5afd7df0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805908 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 5afd7df0-2f9c-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..087c9a3b5eb6dc128b903af0f9319cae35cca375 --- /dev/null +++ b/graph/incidents_graphml/5/5aff0fd0-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.165 + 100.64.39.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517487 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5aff0fd0-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e2759c721e900b025598951c4f8fe472cb9dedb --- /dev/null +++ b/graph/incidents_graphml/5/5b039e50-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.88 + 100.64.43.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388375 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b039e50-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5c0983f5fd7abb161b5c695807db8c1f14758bc --- /dev/null +++ b/graph/incidents_graphml/5/5b062a30-9cad-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.73 + 100.64.39.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702797886 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b062a30-9cad-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e2c5aba3c6807669665aaad950e60f968ba2e4b --- /dev/null +++ b/graph/incidents_graphml/5/5b069e30-41e5-11ed-ad31-51848920452c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.210 + 100.64.75.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.75.211 + 100.64.75.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664668884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b069e30-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b069e30-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b069e30-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b069e30-41e5-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9392c822a9e74209e66a05cae5cdb00f84546f2e --- /dev/null +++ b/graph/incidents_graphml/5/5b06dd30-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b06dd30-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98c64e7e40c3d037247126c3237004b7ea2573c2 --- /dev/null +++ b/graph/incidents_graphml/5/5b0fffc0-5a76-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.167 + 100.64.39.167 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695517487 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b0fffc0-5a76-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1346389e5ab7ac23778a203e268204638e188c63 --- /dev/null +++ b/graph/incidents_graphml/5/5b16c600-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.120 + 100.64.41.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b16c600-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec714d8fa34df9590b45aada713dae2d5fbeb8f3 --- /dev/null +++ b/graph/incidents_graphml/5/5b1c39f0-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5b1c39f0-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58f72f70997e0465a92591dce788d221051e3431 --- /dev/null +++ b/graph/incidents_graphml/5/5b213a60-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.122 + 100.64.8.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005832 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b213a60-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46700f33226e3caa6fe72be9dca1744ca0c43a04 --- /dev/null +++ b/graph/incidents_graphml/5/5b2ac6b0-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710982 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b2ac6b0-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb858b34c874a175729e866ad87ae9667f0199c3 --- /dev/null +++ b/graph/incidents_graphml/5/5b2d37b0-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677710982 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5b2d37b0-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d38798315288f92c07fc936f7560500bd14c7293 --- /dev/null +++ b/graph/incidents_graphml/5/5b2d8b90-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.229 + USER-0015-1354.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694745 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b2d8b90-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fa0265bed9170ad8331d5f400c63b0537d1d28e --- /dev/null +++ b/graph/incidents_graphml/5/5b315660-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Target","Exploiting Host"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710982 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b315660-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d2ec12ba47333fa5c0821ae64e95c26c0c96364 --- /dev/null +++ b/graph/incidents_graphml/5/5b39f3d0-4403-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.214 + USER-0015-1389.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721196667 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b39f3d0-4403-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26aadd662bc5c38fee83c348f9c7321b44042c08 --- /dev/null +++ b/graph/incidents_graphml/5/5b3b5fb0-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689312119 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b3b5fb0-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4b30c106b7996a4bcaa4f9c8a5f0bc4ff47f67a --- /dev/null +++ b/graph/incidents_graphml/5/5b3bada0-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.4 + 100.64.16.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738678 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b3bada0-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f28033bafef8d354ea546d706a9769703f3e21aa --- /dev/null +++ b/graph/incidents_graphml/5/5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388375 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b3c6190-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml b/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9195e4ea5545e74cf0c263e8596202ffc650066 --- /dev/null +++ b/graph/incidents_graphml/5/5b400220-db67-11ee-9e15-db3d7bd62dd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.229 + USER-0015-1354.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709694745 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b400220-db67-11ee-9e15-db3d7bd62dd4 + + + diff --git a/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c370b45501d2b95c2d18429baa0c4c5821079076 --- /dev/null +++ b/graph/incidents_graphml/5/5b431780-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.141 + 100.64.22.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b431780-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afbc4980a04dfd40f5d115bb7c984b8630a7b258 --- /dev/null +++ b/graph/incidents_graphml/5/5b43d400-2a31-11ee-9959-8506340212c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.163 + 100.64.68.163 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690210196 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b43d400-2a31-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210196 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b43d400-2a31-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml b/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..261c6c5beabb79c03a8b16427144078a3de09b86 --- /dev/null +++ b/graph/incidents_graphml/5/5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.90 + 100.64.43.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697388375 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b4e14d0-6b7a-11ee-aba1-d3c2ff55aa47 + + + diff --git a/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..922507f12812670f35ecd9ea081ef256e3ed714b --- /dev/null +++ b/graph/incidents_graphml/5/5b4ec070-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.6 + 100.64.16.6 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738678 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b4ec070-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9cc7001f95f4848d16bd8bbb0c72ec119b27ae4 --- /dev/null +++ b/graph/incidents_graphml/5/5b4fb050-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.120 + 100.64.41.120 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672896 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b4fb050-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cc439521853b297e85768a06bcfdda478424d66 --- /dev/null +++ b/graph/incidents_graphml/5/5b545590-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.141 + 100.64.22.141 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335249 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b545590-61e6-11ee-b713-27a48af32cd1 + + +