diff --git a/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc0440907400f992ba8332639b64f33463d7dfad
--- /dev/null
+++ b/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696969083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1d7dd0b0-67aa-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..710159c9b0dfdc2324a10f8d8699472439613deb
--- /dev/null
+++ b/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694812580
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d8138a0-540d-11ee-99ed-211c2b4ec819
+
+
+ INCIDENT_LINK
+ 1694812580
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d8138a0-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b6ed9ef6ce5471e640361bad48be253459b91ff
--- /dev/null
+++ b/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.112
+ 100.64.55.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871698
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76bab08a71c93887f35437456f18d044f97ae808
--- /dev/null
+++ b/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.7.217.207
+ 10.7.217.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.171
+ 100.64.80.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.172
+ 100.64.80.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1d8c1110-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1d8c1110-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1d8c1110-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1d8c1110-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b6dd81d30768e94804fbb3edd796a21b16ae155
--- /dev/null
+++ b/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696969083
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d8cc4d0-67aa-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9ea861d64d0b10f60cd699c2f529945d47a1443
--- /dev/null
+++ b/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.11.133
+ 100.64.11.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812580
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d93d640-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e83419e5f6414fc583d217e5fe9013bc5fdf4cb2
--- /dev/null
+++ b/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.15
+ 100.64.53.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696969083
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1d9be000-67aa-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70aeb75832a7917ab08b6559d057cef0a854f64f
--- /dev/null
+++ b/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.102
+ 100.64.55.102
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1da00b20-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..130161e158deb461b9c5f2433e517cc1ae154876
--- /dev/null
+++ b/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.97
+ 100.64.69.97
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695200415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1da5b740-5794-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695200415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1da5b740-5794-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695200415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1da5b740-5794-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695200415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1da5b740-5794-11ee-97ff-3b19ab007f30
+
+
+
diff --git a/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5e0c602a59afe55e95752a28962d95607b8abd3
--- /dev/null
+++ b/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.102
+ 100.64.55.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1db36c10-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4f3af841ff34d10baaf39d4538dd195a9f21336
--- /dev/null
+++ b/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.253
+ 100.64.55.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722053
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc2f140-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f19d41d86b7dfefbe6a20c3bffbeb4d007659022
--- /dev/null
+++ b/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.102
+ 100.64.55.102
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..174bdab1951d692f8ce182827903a373503c72a2
--- /dev/null
+++ b/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.150
+ 100.64.19.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.40
+ 100.64.1.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.107
+ 100.64.77.107
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664557971
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557971
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557971
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557971
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557971
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+
diff --git a/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e11507af7bb1a4cdd188a8afbe05840a68d7d6a
--- /dev/null
+++ b/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.33
+ USER-0015-1830.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.197
+ 100.64.75.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675335
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc609e0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675335
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dc609e0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b811bb234ae603ba5b85c5de65fc89190fcd0e10
--- /dev/null
+++ b/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.130
+ 100.64.86.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695289751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1dcd1ee0-5864-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b2a644992b2ca9763f08c3d07377e07feb9e926
--- /dev/null
+++ b/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.86
+ 100.64.69.86
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695745018
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dce21a0-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745018
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dce21a0-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745018
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dce21a0-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745018
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dce21a0-5c88-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml b/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e43cda710531c78bb13872d3d19ad6e755dd3083
--- /dev/null
+++ b/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.17
+ 100.64.17.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700822528
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1dcfe970-8ab6-11ee-b354-dddc00541db7
+
+
+
diff --git a/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7988fab5e6722e8b0d399d7e55df265aa705a9e2
--- /dev/null
+++ b/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.46.230
+ 100.64.46.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812580
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1dd1f0b0-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1608d2490b63112d4cf56e8b1a434f5d0cacf8ec
--- /dev/null
+++ b/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.117.18656
+ 192.168.117.18656
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Umbrella"]
+
+
+ HOST
+ 100.64.80.17
+ 100.64.80.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686675335
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675335
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84202de3bc8f94c134c0fe068d77a0ad19bf871d
--- /dev/null
+++ b/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.130
+ 100.64.86.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695289751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ddc3a10-5864-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14b43a423c30d7c404e52d9e87279897a52d52d6
--- /dev/null
+++ b/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.253
+ 100.64.55.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722054
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1de1c3e0-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml b/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ba602c90adedf274e39d2b70b033f03922ccf84
--- /dev/null
+++ b/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.239
+ USER-0015-1607.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659462423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1dff5420-128b-11ed-aa00-f95a069dbd3d
+
+
+
diff --git a/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9cbc9b5f4c6a704861b2ff3c4de89ab65d6e292
--- /dev/null
+++ b/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.130
+ 100.64.93.130
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812581
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e116ab0-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bddd9494702a77b4afbe7ebaee59902e973ebfc2
--- /dev/null
+++ b/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.105
+ 100.64.69.105
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.248
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989596
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+
diff --git a/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9315d5345bc56f2fdf57c2fd420a2acd1c5bc731
--- /dev/null
+++ b/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801116
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e2a7910-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c901ce6fe9fb5641709345efc482771fd16c6b4f
--- /dev/null
+++ b/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.167
+ 100.64.12.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266691
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1e41d610-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b7ff3a2e40e611e2c659dd722fea061ff053951
--- /dev/null
+++ b/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.108
+ 100.64.77.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+
diff --git a/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71a20977bc35884d1f801ff32baffd61a183c190
--- /dev/null
+++ b/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.184
+ 100.64.76.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.109
+ 100.64.77.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.110
+ 100.64.77.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+
diff --git a/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..258938a9357e9cc07c407e1873efb46e2baf378d
--- /dev/null
+++ b/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.167
+ 100.64.12.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266691
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e59f1f0-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a76c56eafe64d25971b7cbf3ce6eda49f524ba69
--- /dev/null
+++ b/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e5c1c60-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58f471900e82dcadbecaeb5b3621aa398fc91904
--- /dev/null
+++ b/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.252
+ 100.64.71.252
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687130603
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e621420-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130603
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e621420-0e2f-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b80df67868d3e7777a3b8185d8f94f0035b27689
--- /dev/null
+++ b/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.169
+ 100.64.12.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266691
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1e67ad90-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c19f93bbcdf906acdd92778999d6a83aaf0b9f1
--- /dev/null
+++ b/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.21.26.128
+ 10.21.26.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.129
+ 100.64.78.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e694920-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e694920-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8edba7107f1e51c5bda0cf7b3bff60c7aaf29c5c
--- /dev/null
+++ b/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.132
+ 100.64.93.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1694812581
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e6caa10-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2587ac48c9cb76bd8e904895a1740c0d52850d92
--- /dev/null
+++ b/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.142
+ 100.64.17.142
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923821
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e6d2090-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ddbc50f703b48bbdd6b8f1b7011d46c64a79648
--- /dev/null
+++ b/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.169
+ 100.64.12.169
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266691
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e773df0-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7b971cf9bc2988540c6638cab46ecb94a48350b
--- /dev/null
+++ b/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.132
+ 100.64.93.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812581
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e7a8cc0-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..468f32188eaff90b40364076960e129f6462147f
--- /dev/null
+++ b/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.195
+ 100.64.56.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710927728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e7b91a0-e69e-11ee-8f7e-8d09b3cead02
+
+
+
diff --git a/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54171907f55d6a4c0fb4cd6160cae7fa9a53776a
--- /dev/null
+++ b/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.79.235
+ 100.64.79.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.28.143
+ 100.64.28.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680580
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e7c28a0-6f7a-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3516002bbecf374f647ab678c3b460e18cd488b4
--- /dev/null
+++ b/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.68
+ 100.64.9.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1e858280-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39946948a356e15f76bd43a725861af986036b87
--- /dev/null
+++ b/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.46.230
+ 100.64.46.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812582
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1e8f9b60-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cff1b5a0b708f632a88c871fd0a2e5c613df482
--- /dev/null
+++ b/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.103
+ 100.64.18.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874235
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1e95c5d0-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8a058dffa8d5d05b5f575e046b40a5ef3629d24
--- /dev/null
+++ b/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.56
+ 100.64.13.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874235
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1ea4e100-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee5b019330d8a5c54aeed3757611561de40e3a72
--- /dev/null
+++ b/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.68
+ 100.64.9.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ea873d0-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a2d036125ee4931eaa72d1ac23a85c6c9decce4
--- /dev/null
+++ b/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.114
+ 100.64.55.114
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6862f0c752c370b2d46b753b5e42a8ed60ddc52
--- /dev/null
+++ b/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.56
+ 100.64.13.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874235
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1eb29ca0-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..343bd082d4d3bedae5556548cddca012cfafe62c
--- /dev/null
+++ b/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.67
+ 100.64.24.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.60
+ 100.64.41.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.61
+ 100.64.41.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009437
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ebafc50-3937-11ef-a411-6df7c82319e6
+
+
+
diff --git a/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e35c991c5b128ab2e3ad54ab8ed9bf9fa070f748
--- /dev/null
+++ b/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.70
+ 100.64.9.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ec94240-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf0dbe5cf047202b15887b23c2c749ba83594432
--- /dev/null
+++ b/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.134
+ 100.64.93.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694812582
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1eca8180-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1285bda18fed2fd9d800f81aeba598598653b226
--- /dev/null
+++ b/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.57
+ 100.64.16.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301973
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1ed1c190-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc46eaf1a4998e0395918aa7df27f8a11c3f5758
--- /dev/null
+++ b/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.134
+ 100.64.93.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694812582
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ed975a0-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e89448ddc55248289e67bdabb514a393c8b74c39
--- /dev/null
+++ b/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.70
+ 100.64.9.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1ee61910-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2c696d227f4f6e2da7bdaf359cb3461f6dc1517
--- /dev/null
+++ b/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.248
+ 100.64.8.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ee9b950-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76304fb15f46ab3e572fd7fd0fecd6580f7965f0
--- /dev/null
+++ b/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.154
+ 100.64.55.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.155
+ 100.64.55.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.86
+ 100.64.2.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.180
+ 100.64.51.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.224
+ 100.64.13.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1eeab5a0-1329-11ef-aba1-33e212db0be8
+
+
+
diff --git a/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c14c6f8975c2c6683908d5b310ad579206c62d8
--- /dev/null
+++ b/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.57
+ 100.64.16.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301973
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ef15780-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..082c7d864ad35a64f823c5156233882a9c6a1612
--- /dev/null
+++ b/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.148
+ USER-0015-1461.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425370
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1ef94b30-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4e4cd574ed3ef5c0f8c8e815cf4bcfd532c0eeb
--- /dev/null
+++ b/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.250
+ 100.64.8.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1efb4580-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..719e3520cceeeee61d1284d8851248cb0508de1a
--- /dev/null
+++ b/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690153831
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f00d2a0-29ae-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690153831
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f00d2a0-29ae-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml b/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..398189de7196640e45339b9b3f33ac24b8527073
--- /dev/null
+++ b/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.224.96
+ 192.168.224.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.21
+ 100.64.85.21
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676686961
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f01adb0-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676686961
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f01adb0-af33-11ed-996b-a522ebb85241
+
+
+
diff --git a/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..607fb52477e3310e497e20a58d006dd81b660115
--- /dev/null
+++ b/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.250
+ 100.64.8.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a42fa6e384cad6dc619c631aec9512706cb05707
--- /dev/null
+++ b/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.148
+ USER-0015-1461.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425370
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f1fe600-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e037cd46273e03dfd0542766b2b2c878fe36a45
--- /dev/null
+++ b/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.2
+ USER-0015-1983.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695289753
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f2ed1c0-5864-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95748070ce09ea02745f1c723ae1af84afa34897
--- /dev/null
+++ b/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.115
+ 100.64.78.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.220
+ 100.64.71.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658782961
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f38a050-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658782961
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f38a050-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c2361322a2242be253090ab3ecfbe425d65bdc5
--- /dev/null
+++ b/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.123
+ 100.64.47.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923822
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f3ea160-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acc350867cd1080ef468c52d4e93b036cf9c8f0b
--- /dev/null
+++ b/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.255
+ 100.64.55.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f443a10-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..736c3b6afa29d92ae28f60aa2c25d8e8eecea016
--- /dev/null
+++ b/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.128
+ 100.64.70.128
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712773277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f4e4760-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f4e4760-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f4e4760-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f4e4760-f767-11ee-a32a-474576cc2660
+
+
+
diff --git a/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..029202370cb05068463482bead41f3eea42b02d3
--- /dev/null
+++ b/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688982165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f519850-1f06-11ee-984e-6dd184c65476
+
+
+
diff --git a/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8db3148755faec14c17c84e4830ae1ca5f8df226
--- /dev/null
+++ b/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.228
+ 100.64.7.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301974
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f51c700-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fd478e7d80f610649d5a65bb6c7e23b193f6c3d
--- /dev/null
+++ b/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.51
+ 100.64.27.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516209
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f5af2a0-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdc1943049f9f8ebaec745c92e40c5e45532e687
--- /dev/null
+++ b/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.20
+ 100.64.31.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642932
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f673e30-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55726c468f9962add5fa4e57802f1deb885c7d0b
--- /dev/null
+++ b/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688982165
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f6b61e0-1f06-11ee-984e-6dd184c65476
+
+
+
diff --git a/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a12b8b9da9f6da1688a8944c299d83f11177a38
--- /dev/null
+++ b/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.2
+ 100.64.51.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688041138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f708090-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f708090-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c0bce2c2b4a64b050b3225fab584735c7e23445
--- /dev/null
+++ b/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.51
+ 100.64.27.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f733590-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85b674de1f00cf29130ff52d2240a89589aec0e7
--- /dev/null
+++ b/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.20
+ 100.64.31.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642932
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f760b40-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e55fc911f2bf3452fcee557881f2a0808684879f
--- /dev/null
+++ b/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.237
+ 100.64.28.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f78aff0-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d89e7ee791228d1e62f5c11b6ea753ebfe46b49
--- /dev/null
+++ b/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.171
+ 100.64.12.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1f802270-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ced670c066199754d36f7d66a180bedbf85684cc
--- /dev/null
+++ b/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.0.2.182
+ 192.0.2.182
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336479
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1f807b10-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e392684f47769ddc2e3b8320e9f00642d23d926e
--- /dev/null
+++ b/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.53
+ 100.64.27.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1f8250c0-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08632351f92f14d107c1175fe68e0615e1eb8cfc
--- /dev/null
+++ b/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.122
+ 100.64.28.122
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425371
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1f8621e0-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e779f3f38ab1006a6962b4d143555cb6da336ce
--- /dev/null
+++ b/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.130
+ 100.64.19.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801118
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1f880d40-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d38eafd2bb7e5cf38d37724e6b559e37ae090ab
--- /dev/null
+++ b/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.235
+ 100.64.80.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.65.32
+ 100.64.65.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f8aef70-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f8aef70-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f8aef70-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f8aef70-12df-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fa879d2d4a50bd14277db0f984e36c04c34ed12
--- /dev/null
+++ b/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.195
+ 100.64.58.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1f8ef560-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ffc2e472874881969a8691a2e7ba403c2ab16c7
--- /dev/null
+++ b/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.171
+ 100.64.12.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f907620-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8f9357a956c726e9556c1f34bbc0cd2e63ee561
--- /dev/null
+++ b/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.53
+ 100.64.27.53
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f978670-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bf2e6bee49f477d1db08b67e9587b22ddf32f69
--- /dev/null
+++ b/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.237
+ 100.64.28.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301974
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f997e60-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc875c01a8d66175b44ba67fff02250001822c00
--- /dev/null
+++ b/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.173
+ 100.64.12.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1f9ef510-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b7abb61512ccadefd75d624306810105fd2b2ff
--- /dev/null
+++ b/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.88
+ 100.64.55.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.115
+ 100.64.81.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fa61890-12df-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc026b3289bfe73504718ceecbcd4d07c6eecf04
--- /dev/null
+++ b/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1fafe500-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1560cde70fc2289c207e7a812798b0282bd130a
--- /dev/null
+++ b/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.122
+ 100.64.28.122
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425371
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1fb19eb0-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d1666205ff963597240e5014246415e0e422388
--- /dev/null
+++ b/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.253
+ 100.64.20.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704145118
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fb284e0-a8ee-11ee-8c6a-79d6a27183d0
+
+
+
diff --git a/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..447a7af33901037668b933cbcb6ef3de1b2dccca
--- /dev/null
+++ b/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.195
+ 100.64.58.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1fb54210-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbcefc1a31f9e97ae4fd3979ae936952a9665dff
--- /dev/null
+++ b/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml
@@ -0,0 +1,824 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.140
+ USER-0015-2028.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.141
+ 100.64.89.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.142
+ 100.64.89.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.136
+ 100.64.89.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.10.145
+ 100.64.10.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.99
+ 100.64.18.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.137
+ 100.64.89.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.143
+ 100.64.89.143
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.144
+ 100.64.89.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.145
+ USER-0015-2029.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.121
+ 100.64.43.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.146
+ 100.64.89.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.147
+ 100.64.89.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.148
+ 100.64.89.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.149
+ 100.64.89.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 1fbe1120-1aa5-11ee-ae54-3b636b49055b
+
+
+
diff --git a/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a79d2cfa6aae63442bde2ff7b91e69dcc67f6f8
--- /dev/null
+++ b/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1fbfea90-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95739c678f5c9ce145c8c7f478feaed138b09615
--- /dev/null
+++ b/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.177
+ 100.64.12.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694266693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1fceb7a0-4f16-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfee0fe7845e65e858361162a6a395c72e87b7f7
--- /dev/null
+++ b/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.217
+ 100.64.35.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425372
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1fd49000-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2554dac4bf7b534335c8025064f4e9152c06a099
--- /dev/null
+++ b/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.130
+ 100.64.69.130
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.131
+ 100.64.69.131
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424582
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82fcb2cd8615a1bab5340be747600a175b581315
--- /dev/null
+++ b/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.157
+ 100.64.42.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fd944d0-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d070139066174bf4483ce562ae6aa4fd8b37425a
--- /dev/null
+++ b/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.28.205.172
+ 172.28.205.172
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.73
+ 100.64.92.73
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718132538
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fdaaae0-2825-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132538
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fdaaae0-2825-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..260a7257aa1d59737cf203b4d1a300735f76d2e9
--- /dev/null
+++ b/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.252
+ 100.64.8.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..751ed4b726348463e4cf5421b2fcd903201e2c33
--- /dev/null
+++ b/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.72
+ 100.64.9.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1fe3da00-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfb0b1bf68162b39f32169ddb13fc7e463518800
--- /dev/null
+++ b/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.252
+ 100.64.8.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336480
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ff07af0-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..530cce4ae1fb66751b35ff544a4bef0706c1c5a2
--- /dev/null
+++ b/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.157
+ 100.64.42.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1ffa8870-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..338aafd77e675b6e4171b010ab7b0dd04dea0980
--- /dev/null
+++ b/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.217
+ 100.64.35.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20011e40-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02fafa1bd2b947e1b8f72e9b03fd3b36bc971a48
--- /dev/null
+++ b/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 200329e0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e60d2f05573fbf5461ca08ef35d96ebb3b8b5e82
--- /dev/null
+++ b/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.196
+ 100.64.58.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2013b5c0-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd9fbc5272c4780b34d132f779730f0cf122c6d0
--- /dev/null
+++ b/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923824
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 201615a0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d188c15a1b23ae790aa618529bb7ac59bb9cb88
--- /dev/null
+++ b/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.72
+ 100.64.9.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287705
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20185780-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5a69a2b0ef0f7fcb357e7111838886e2091ab53
--- /dev/null
+++ b/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723228
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2018aa50-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..894f0b73c26efd46040bbb32fdfc641f80f7e7ce
--- /dev/null
+++ b/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.60
+ HOST-6694
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 202061a0-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c7e28e5d524af7d3d3973784fd1926675b91816
--- /dev/null
+++ b/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.155
+ 100.64.57.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746871
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 202288f0-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db16de6d057f843c2b75f298accd68e22b77171a
--- /dev/null
+++ b/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.110
+ USER-0015-1308.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700801916
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20228cd0-8a86-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1f0d0123f2a3f576d5b392dd5b5af23d911e61e
--- /dev/null
+++ b/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.110
+ USER-0015-1308.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700801916
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20348e30-8a86-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b8eb5b36d9897e1b371bca12659fc371f9a3eb5
--- /dev/null
+++ b/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.136.204
+ 172.21.136.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.133
+ 100.64.88.133
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 203e3da0-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500700
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 203e3da0-1aa5-11ee-ae54-3b636b49055b
+
+
+
diff --git a/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6d6303b76d0103f2cf98ed40b1fc5732fdfd55d
--- /dev/null
+++ b/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.111
+ 100.64.10.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700801916
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2041d4a0-8a86-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8df97809e79d2b13c3e446723c8429a038b23d8c
--- /dev/null
+++ b/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.64
+ 100.64.68.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1687408490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 204996d0-10b6-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42f31643396bd4d88753e970887c94b89f4f4eb9
--- /dev/null
+++ b/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.111
+ 100.64.10.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700801916
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20500570-8a86-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55d94e3be5073e2c0af54e1795bcdcf930611d03
--- /dev/null
+++ b/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.247
+ 100.64.64.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20682570-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml b/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9224ca9e9329323f9e41564ede36b794b3068a20
--- /dev/null
+++ b/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.158
+ 100.64.19.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717913925
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2080e440-2628-11ef-a119-11a748dd97ab
+
+
+
diff --git a/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ae54c9b9018fb38576ee43a1cb7ce015dca6f73
--- /dev/null
+++ b/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.125
+ 100.64.47.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20810c70-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa1f6d41a0fb08bba2ee176b3ec59c9b6092abf8
--- /dev/null
+++ b/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.62
+ 100.64.36.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20845390-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2320ec9a3be70ab9a321af5846bc448168088dae
--- /dev/null
+++ b/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20860db0-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5ce65ae832e43acc6d73a89538ba0441c7c168a
--- /dev/null
+++ b/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20880180-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml b/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2960a2c4b704290df842d449e0052ceddd98b4b7
--- /dev/null
+++ b/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.160
+ 100.64.19.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717913925
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 208e78d0-2628-11ef-a119-11a748dd97ab
+
+
+
diff --git a/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b940a0646ffb9b8b2cd46fe5c52aa6106a038f6a
--- /dev/null
+++ b/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.143
+ 100.64.32.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 208ffef0-a390-11ee-8ba4-254a3074c3aa
+
+
+
diff --git a/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54011331f9f73c49afb54b7513bd3529896f9ce2
--- /dev/null
+++ b/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.125
+ 100.64.47.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20935bf0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f0444b75395989e2ac1a2767a57dd28dbd150fd
--- /dev/null
+++ b/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2093af20-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..123b9026b6f5bfbfe3befc03c0be9818a9f2d150
--- /dev/null
+++ b/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.41
+ 100.64.17.41
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695719252
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 209464d0-5c4c-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9689ea1939c0058bc79098555136d0f275d37bc7
--- /dev/null
+++ b/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 209995b0-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23232855df92cfe45a366eb14cbb2f18584e6375
--- /dev/null
+++ b/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 209b3b60-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aacafeed7a67d58dc5a97ad4d17e1d33eefcbee8
--- /dev/null
+++ b/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.170.40
+ 192.168.170.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.52
+ 100.64.83.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.53
+ 100.64.83.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 209fb1c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 209fb1c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 209fb1c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 209fb1c0-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c94b2a895556ce32643f848309badf9b008ce09
--- /dev/null
+++ b/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.115
+ 100.64.66.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728812
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20a1eba0-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0323953115a44aeff501506497459fe7a3287d26
--- /dev/null
+++ b/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20a7ed90-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d6f23f777095b12102b19a7fb708c5832cd2fa6
--- /dev/null
+++ b/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.157
+ 100.64.57.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20a80ca0-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb129a41e51b20002644d41ffce5db4435211a90
--- /dev/null
+++ b/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.223
+ 100.64.47.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722058
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20b15ea0-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c15457068c6e23c93ea83509536121cc326a0a2c
--- /dev/null
+++ b/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.115
+ 100.64.66.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728813
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20b1ca20-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9754a7464f0848cb9a28683b309772b466feb88
--- /dev/null
+++ b/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.157
+ 100.64.57.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20b63d70-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b0e7290f6f1a711202b3231933ab31863ea5877
--- /dev/null
+++ b/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20b69390-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b70aed2119090582e483df0dd485c15cc9779cf
--- /dev/null
+++ b/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.121
+ 100.64.66.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20b6c780-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml b/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17ab814765b2d529c7eb5a6ed9df54e84836bd50
--- /dev/null
+++ b/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.138
+ 100.64.30.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702069791
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20b9a550-960e-11ee-9038-c9d706efb14e
+
+
+
diff --git a/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a4008055dfad859d37d0b33793cf1c9b73a163b
--- /dev/null
+++ b/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.62
+ 100.64.36.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687301976
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20bb6920-0fbe-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dd809abe41921c344deae666711b50d627d314f
--- /dev/null
+++ b/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.134
+ 100.64.22.134
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.241
+ 100.64.68.241
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.242
+ 100.64.68.242
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490075
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20bba8a0-e2a3-11ee-8bca-5190faa7db82
+
+
+
diff --git a/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27da8731c156e89f54406c1b98df63a5e327ceb0
--- /dev/null
+++ b/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.224
+ 100.64.69.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20bf9a70-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20bf9a70-a390-11ee-8ba4-254a3074c3aa
+
+
+
diff --git a/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f45653ac41d99d82912e3fe75e87e479cd060398
--- /dev/null
+++ b/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842387
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20c1e130-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml b/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4a151eab16f1bae501b928bd1c1e048ce6a9b1f
--- /dev/null
+++ b/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.250
+ 100.64.26.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.108
+ 100.64.48.108
+ []
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.48.109
+ 100.64.48.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.60
+ 100.64.9.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.110
+ 100.64.48.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c2e090-7b95-11ee-9581-a3221813a5fb
+
+
+
diff --git a/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ffde7d1b19d793e640e81a4f560a5d83fb62a8f
--- /dev/null
+++ b/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.158
+ 100.64.57.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c42020-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml b/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c385802010538e645ba6c2e879fa8b961ef481f2
--- /dev/null
+++ b/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.138
+ 100.64.30.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702069791
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20c62870-960e-11ee-9038-c9d706efb14e
+
+
+
diff --git a/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e61d9aec459bf7f662e9cfcb5d62170dc42e2422
--- /dev/null
+++ b/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.31
+ 100.64.61.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c6e740-558d-11ee-a21e-c5479afee9bb
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c6e740-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdd866eb7b147b4fe153e42741ec9f59cf543ab4
--- /dev/null
+++ b/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.121
+ 100.64.66.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20c8a1d0-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fec14b53d629cfffd50c0a55c2a0177e49557444
--- /dev/null
+++ b/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.254
+ 100.64.8.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712336481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20c927b0-f36e-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f114a48d99bc727a3b0b7572ba68b98cc95b8e5
--- /dev/null
+++ b/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.54
+ 100.64.83.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.52.131
+ 100.64.52.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ccdc40-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ccdc40-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ccdc40-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ccdc40-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a052747c89910d811edba48087e03f1c8f4fe6e
--- /dev/null
+++ b/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,445 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.81
+ 100.64.8.81
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.31
+ 100.64.12.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.32
+ 100.64.12.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.34
+ 100.64.12.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.35
+ 100.64.12.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.36
+ 100.64.12.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.37
+ 100.64.12.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.38
+ 100.64.12.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d068a0-675e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec49907fc2a4ddcc2a938ef55eb5ba412a559053
--- /dev/null
+++ b/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.158
+ 100.64.57.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20d27800-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5174e3dfffd65306f4d3b980481fb855a6064660
--- /dev/null
+++ b/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.31
+ 100.64.61.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d3df90-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d26097d81cc3c4e4ff07613aab2c872b5a614e41
--- /dev/null
+++ b/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.132
+ 100.64.19.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801121
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20d4d890-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59433b481445df1a5edd0b23ea2983d46f11907c
--- /dev/null
+++ b/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml
@@ -0,0 +1,825 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.200
+ 100.64.27.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.29.132
+ 100.64.29.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.225
+ 100.64.69.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.21
+ 100.64.68.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.143
+ 100.64.26.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.33.184
+ 100.64.33.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.226
+ 100.64.69.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.22.250
+ 100.64.22.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.49.104
+ 100.64.49.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.46.234
+ 100.64.46.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.227
+ 100.64.69.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.228
+ 100.64.69.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.177
+ 100.64.29.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d67dd0-a390-11ee-8ba4-254a3074c3aa
+
+
+
diff --git a/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19833bb5ede725d03ef5be9602f2770106a53e7e
--- /dev/null
+++ b/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.27.200
+ 100.64.27.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20d9b220-a390-11ee-8ba4-254a3074c3aa
+
+
+
diff --git a/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90bd1f1eee99cf3d0d4693398b246d2b2c6913c1
--- /dev/null
+++ b/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.53
+ 100.64.86.53
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715877252
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df27a0-13a2-11ef-ad44-1f39f7953267
+
+
+
diff --git a/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..285f6616ead2149f2a59b19c02a6db0d389e4b95
--- /dev/null
+++ b/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,839 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.48
+ 100.64.12.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.49
+ 100.64.12.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.50
+ 100.64.12.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.51
+ 100.64.12.51
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.52
+ 100.64.12.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.53
+ 100.64.12.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.54
+ 100.64.12.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.55
+ 100.64.12.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.85
+ 100.64.3.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.56
+ 100.64.12.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.57
+ 100.64.12.57
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.58
+ 100.64.12.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.60
+ 100.64.12.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936447
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20df83d0-675e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d687f79c747735bdbbfcc1e90679768fc5390b15
--- /dev/null
+++ b/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.79
+ 100.64.46.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20dfa280-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fdeec9e8ab814f0d452933b05de154264cff46c
--- /dev/null
+++ b/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.226
+ 100.64.48.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20e062b0-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4254da002a0b40c6a32b2d7f34b43a3dcf52b1b3
--- /dev/null
+++ b/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20e081c0-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c137206ea9ccb31cb6f52a5d9d9f5b8b026c607f
--- /dev/null
+++ b/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.132
+ 100.64.19.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801121
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 20e5ef90-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5871179349c2050b8b05311c5845a9522b03df44
--- /dev/null
+++ b/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.1
+ 100.64.55.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041680
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20e740e0-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a00bba5c0a50d29b7ef70415c2a62909b66b068
--- /dev/null
+++ b/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.125
+ USER-0015-1291.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.155
+ 100.64.28.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.49
+ 100.64.32.49
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.166
+ 100.64.10.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.50
+ 100.64.32.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738019
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 20ea3520-6590-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3218f600d7afe900bbe4d6cc65024ec4b2800f5
--- /dev/null
+++ b/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.238
+ 100.64.68.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1711335325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ec8260-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ec8260-ea53-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..049317f1c34fa247a425efbb542910650088925a
--- /dev/null
+++ b/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.226
+ 100.64.48.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20edf740-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..caa76fcfd004240e97d8738af59e3a8ae874f183
--- /dev/null
+++ b/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.165
+ 100.64.26.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711792739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20f29bf0-ee7c-11ee-8c82-b10f259979aa
+
+
+
diff --git a/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d72ab59f035b276f44a6a1c8234c1d2b004206f8
--- /dev/null
+++ b/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746873
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 20f457e0-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24b12225d1d4933e4e57f8466a9145ed8f0bfb54
--- /dev/null
+++ b/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801121
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20f57ff0-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7707615ab213afc54be42b1f33b0faf8e525a37d
--- /dev/null
+++ b/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.82
+ 100.64.13.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1703554991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 20ff6290-a390-11ee-8ba4-254a3074c3aa
+
+
+
diff --git a/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98704ba1ad93566e040cb1bc663e037c62c4b6eb
--- /dev/null
+++ b/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.23
+ 100.64.12.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473477
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 210049e0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45c92af8cbd17a95a764ac97604af69fe4af0889
--- /dev/null
+++ b/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801121
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2103d7d0-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac4f7be92ae3d4eaad713710df86891dea310c20
--- /dev/null
+++ b/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.137
+ 100.64.38.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.138
+ 100.64.38.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.139
+ 100.64.38.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.140
+ 100.64.38.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.180
+ USER-0015-1207.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2107e720-7c09-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de445e0e70db8273c09424e600066716ba013189
--- /dev/null
+++ b/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.19
+ 100.64.80.19
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.139
+ 100.64.71.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 210de1e0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675341
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 210de1e0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2beffafaa72845d8fb0d61bae40f57ec8cfe1e44
--- /dev/null
+++ b/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.118
+ 100.64.15.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694977512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 210f13d0-558d-11ee-a21e-c5479afee9bb
+
+
+
diff --git a/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31f70314f4ceb406d1aa111413ab3b38f0aa1b3f
--- /dev/null
+++ b/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.161
+ 100.64.57.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694746873
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21106b60-5374-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..123c05e84db39cdba4afc69e2c3eacd1e5e9bf5d
--- /dev/null
+++ b/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.104
+ 100.64.3.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.127
+ USER-0015-1367.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.128
+ 100.64.47.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.38
+ 100.64.10.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.86
+ 100.64.33.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.115
+ 100.64.39.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.35
+ 100.64.43.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.129
+ 100.64.47.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.235
+ 100.64.28.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.255
+ 100.64.26.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.140
+ 100.64.38.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694923825
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 211228e0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43a30fecf604cd45fb68f5b880fe1381020b5d47
--- /dev/null
+++ b/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.137
+ 100.64.38.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699208914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2117c5a0-7c09-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..260270057a7cbc9f6189f86e59527d3d9b7c1801
--- /dev/null
+++ b/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.192
+ 100.64.76.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.125
+ 100.64.71.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658782964
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 212443b0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658782964
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 212443b0-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74d58b0bb65e75fddc49b41565d7f97b119adf16
--- /dev/null
+++ b/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.23
+ 100.64.12.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 212732d0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml b/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bca6a35c5644244774fc8ec9b1cdd05b4d10457c
--- /dev/null
+++ b/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.190
+ 100.64.32.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.114
+ 100.64.48.114
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.115
+ 100.64.48.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.103
+ 100.64.43.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.41
+ 100.64.23.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.116
+ 100.64.48.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.64
+ USER-0015-1247.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.34
+ 100.64.37.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.157
+ USER-0015-1377.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.54
+ 100.64.21.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.181
+ 100.64.26.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.168
+ 100.64.41.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+ INCIDENT_LINK
+ 1699159093
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21472bc0-7b95-11ee-9581-a3221813a5fb
+
+
+
diff --git a/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd7c9c1edd011fbc7186d856486dc12e37f223ca
--- /dev/null
+++ b/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.131
+ 100.64.44.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2152d330-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1235ddcf9eeb8b3195521b781858be83c1903b6c
--- /dev/null
+++ b/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.55
+ 100.64.27.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516213
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21558a20-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a818779077f8e9d5b54393b52114a8354bc708c8
--- /dev/null
+++ b/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.168
+ 100.64.61.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21591f30-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f34ec848a1b098263f9ff792378eca48b2e1c95c
--- /dev/null
+++ b/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.131
+ 100.64.44.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2162ffd0-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da2119c28621e05e22a587186574f71914bc02db
--- /dev/null
+++ b/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.55
+ 100.64.27.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516213
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21654190-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10bb0353c1597d957278ab9539db37ac5579281a
--- /dev/null
+++ b/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.168
+ 100.64.61.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2169e810-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..697c2c5b7d7516fcd2564ca28a02de22908727ef
--- /dev/null
+++ b/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.145
+ USER-0015-1317.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699208915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2174b2b0-7c09-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1950577f9274fc10564533f324ac203d1584144c
--- /dev/null
+++ b/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2175e3f0-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5aec5ffd1fa041c68685c9179d60637c5427cb80
--- /dev/null
+++ b/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21769000-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..071bd7fdb8b3bde7d9c563dae22bd6891837068d
--- /dev/null
+++ b/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.79
+ 100.64.58.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.35
+ 100.64.97.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.3
+ USER-0015-2165.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.36
+ 100.64.97.36
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.37
+ 100.64.97.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.38
+ 100.64.97.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.71
+ 100.64.17.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2176c970-39b9-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b78030b0d1718c154203919edf336349eeb396d6
--- /dev/null
+++ b/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.108.33
+ USER-0015-1987.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755180
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21836820-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755180
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21836820-36e7-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bb85b0c71bdfdb898dd409ee41ace733e8965ee
--- /dev/null
+++ b/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.24
+ 100.64.19.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 218820f0-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19555d704e7367497970a8824c890c2991cdb3cb
--- /dev/null
+++ b/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694923826
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 218cb010-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec5120120408b7f7b7dfb2f8ecda415aee43109a
--- /dev/null
+++ b/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663558968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2191a590-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2191a590-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cc2e29bf755c4dc962e5847dd91677f8f23b727
--- /dev/null
+++ b/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.24
+ 100.64.19.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21978a40-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3b6d7075c97f4276a6dc56a2ed5b1fa691758c4
--- /dev/null
+++ b/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425375
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 219ccce0-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ca34b5853456cd0628dec7e993a34e527109587
--- /dev/null
+++ b/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.26
+ 100.64.19.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21a60930-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f477c63f8fc2a187d2125c6dccbfbcaf2624a66
--- /dev/null
+++ b/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.26
+ 100.64.19.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21b54b70-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af2a4dbd0e0465a89ec1741f759a8167b3613479
--- /dev/null
+++ b/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 21d34350-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9025e85095c76016aff8b3b1200c0ed0f12ef4f0
--- /dev/null
+++ b/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.113
+ 100.64.22.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 21d427f0-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..701abef0dd4697d5acdd523c9d6231050e1594d5
--- /dev/null
+++ b/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.247
+ 100.64.47.247
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692035461
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21e14e90-3acb-11ee-a022-b5e9f791d58e
+
+
+
diff --git a/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e54033153119f77de6e563f295981d21acc8fc9
--- /dev/null
+++ b/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.183
+ 100.64.37.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 21e2fac0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c79064f755bf73a8aa063caff0f59885f115c29e
--- /dev/null
+++ b/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.104
+ 100.64.30.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1896.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Umbrella","Meraki"]
+
+
+ HOST
+ 100.64.81.116
+ 100.64.81.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.117
+ 100.64.81.117
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646005
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 21ea3c30-12df-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..934a82a281d8aa59db4a4fed7b5d0c123644b3e4
--- /dev/null
+++ b/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.124
+ USER-0015-1334.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 21f1a0c0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15511468215ece72612ac57a225fc5015106913a
--- /dev/null
+++ b/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.16
+ 100.64.45.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21f4c6e0-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad78fa77454c2b4379259c1fddbe242cda482f43
--- /dev/null
+++ b/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.6
+ 100.64.43.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 21ff8370-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c7b8d80377629193d8dff16126d7e0f2efe83b9
--- /dev/null
+++ b/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.18
+ 100.64.45.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2201bf30-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41833e9da27cdb26a6cb5cdd8a7778f5e1b4928a
--- /dev/null
+++ b/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.153
+ 100.64.47.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.55
+ 100.64.1.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.8.30
+ 100.64.8.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 220440f0-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e4bb67a2445a9268fb432e99fb3c44684c22830
--- /dev/null
+++ b/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.202
+ 100.64.38.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.131
+ 100.64.52.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.1
+ 100.64.56.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.71
+ USER-0015-1414.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.241
+ 100.64.24.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.2
+ 100.64.56.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.13
+ 100.64.36.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.3
+ 100.64.56.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.4
+ USER-0015-1415.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.5
+ 100.64.56.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.6
+ 100.64.56.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.7
+ 100.64.56.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.8
+ 100.64.56.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.9
+ 100.64.56.9
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.89
+ 100.64.26.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.10
+ 100.64.56.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.11
+ 100.64.56.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2205a400-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..611f1807c90ae2ae7fc43936227dc6b6fd892a51
--- /dev/null
+++ b/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.3
+ 100.64.55.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22066c80-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..363054d05dd6eb844c0cbc9ea458b78aad524d02
--- /dev/null
+++ b/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.121
+ 100.64.39.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.122
+ 100.64.39.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711340051
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2208c6d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340051
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2208c6d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340051
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2208c6d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340051
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2208c6d0-ea5e-11ee-b380-23a0be8babf0
+
+
+
diff --git a/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6697497ee6ffffcb4a87c59a7aaaba25bc66759
--- /dev/null
+++ b/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 220cf0f0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..911701e96b82c100c64f987255bcd4caa7b5a7c2
--- /dev/null
+++ b/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.18
+ 100.64.45.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22101710-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adea6910dfcadadf78c3e0ce77cc7b37827f64f7
--- /dev/null
+++ b/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692035462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22149390-3acb-11ee-a022-b5e9f791d58e
+
+
+
diff --git a/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53b4cb2016165f749c4d02e2e18ab717898a7d20
--- /dev/null
+++ b/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.3
+ 100.64.55.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041682
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 221846d0-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaedd59e04e5f4fb37a32e626521f8866d5257e0
--- /dev/null
+++ b/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.178
+ 100.64.35.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.58
+ 100.64.1.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22188c40-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22188c40-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22188c40-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22188c40-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ee1c5956e4256d5ba8620516462e3cee0c55b32
--- /dev/null
+++ b/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.230
+ 100.64.8.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.231
+ 100.64.8.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.232
+ 100.64.8.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.233
+ 100.64.8.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22199780-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+
diff --git a/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e54d2c9d97dc8227a4bd2309402356d107af1b19
--- /dev/null
+++ b/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 221ad3a0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da0c007a9dfcf987d8d9ad20262a6d533acbe663
--- /dev/null
+++ b/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.22
+ 100.64.64.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473479
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 221b2fc0-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87c72b4e6f53e87f0e3c60e676e283a66c2c7d69
--- /dev/null
+++ b/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.12
+ 100.64.92.12
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666302165
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 221d93a0-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e4a93da43e072c017df01d08a241a1799350443
--- /dev/null
+++ b/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.202
+ 100.64.38.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722061
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22242880-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ef3b089ca26c81c63511138d39ae3cfdbf4374e
--- /dev/null
+++ b/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.31
+ 100.64.28.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041683
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22276200-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ddc08616baf4ac26d29cf9a4bbef4c5b90c115b
--- /dev/null
+++ b/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.80
+ 100.64.64.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934862
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2229c7c0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd12df9e29b35715c53e7e04a435517e45da790a
--- /dev/null
+++ b/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.129
+ 100.64.70.129
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.38.223
+ 100.64.38.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712773282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 222eab00-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 222eab00-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 222eab00-f767-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 222eab00-f767-11ee-a32a-474576cc2660
+
+
+
diff --git a/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d1ee19902173782566e002cb11bebeff56644ef
--- /dev/null
+++ b/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610655
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 224a6a00-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e2461db16b7c3cc3dfa34391a28fdd52f49e612
--- /dev/null
+++ b/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.27
+ 100.64.40.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934863
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2256f240-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee63c4fa5a30e2df246752ad5e5a76418bf5593a
--- /dev/null
+++ b/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.147
+ 100.64.7.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774668
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 225d72a0-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aeb42e1b7409b591ea0c7562659107f2494fe465
--- /dev/null
+++ b/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1669680587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22601990-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22601990-6f7a-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52afeeabea73cf87778963d510042f9f5498a5d1
--- /dev/null
+++ b/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.150
+ 100.64.64.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.151
+ 100.64.64.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.164
+ 100.64.15.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.152
+ 100.64.64.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.153
+ 100.64.64.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.189
+ 100.64.18.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.14
+ 100.64.5.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.121
+ 100.64.18.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.154
+ 100.64.64.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.42
+ 100.64.9.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.226
+ 100.64.48.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.155
+ 100.64.64.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.156
+ 100.64.64.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.157
+ 100.64.64.157
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.158
+ 100.64.64.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.159
+ 100.64.64.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.173
+ 100.64.37.173
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+ INCIDENT_LINK
+ 1686425376
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22639f50-07c5-11ee-a204-2747d24db9a4
+
+
+
diff --git a/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..989a8fe272590d08f7aedf5a5c6c15889225d6ec
--- /dev/null
+++ b/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.27
+ 100.64.40.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934863
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22665b90-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd397343aa310cef69d917bc7888838773654ae8
--- /dev/null
+++ b/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.170
+ 100.64.11.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934863
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 227576c0-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b6932dde34854a4f091477d4d969b70bf314d31
--- /dev/null
+++ b/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.174
+ 100.64.49.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 227e8f30-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba87e008810981bf89a65e4628246650555edceb
--- /dev/null
+++ b/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.130
+ 100.64.78.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ USER-0015-1611.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.131
+ 100.64.78.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 228b7b90-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 228b7b90-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 228b7b90-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 228b7b90-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..173392f9ce603581b8fe5b4f1e8cce310b0a5b3b
--- /dev/null
+++ b/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.174
+ 100.64.49.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22906980-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4af423fc3bfa945a5454293d176e13345be4e40b
--- /dev/null
+++ b/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.175
+ 100.64.65.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842390
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 229d7f00-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..914e6ab26622f7027dc3d79006df32683aa5de4d
--- /dev/null
+++ b/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692035463
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 229d99b0-3acb-11ee-a022-b5e9f791d58e
+
+
+
diff --git a/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..771e6640fdd09bcdf553f15ff9393c4516f987d8
--- /dev/null
+++ b/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.20.68
+ 100.64.20.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1715877255
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22a96050-13a2-11ef-ad44-1f39f7953267
+
+
+
diff --git a/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39eef31439bfae9106c39b88f95b0d9ec8918df0
--- /dev/null
+++ b/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.5
+ 100.64.55.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041683
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22af2fa0-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd943f8014241e30c8f6396072ff64728c1a7c8b
--- /dev/null
+++ b/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.28
+ 100.64.19.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363737
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b1acd0-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd31521187c04aeae39683d4bd7b196df11d7b8e
--- /dev/null
+++ b/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.47
+ 100.64.69.47
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.48
+ 100.64.69.48
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.49
+ 100.64.69.49
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105076
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22b751a0-56b6-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7a162967af129ec829a4e0c237e0421b485f3ab
--- /dev/null
+++ b/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.156
+ 100.64.36.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696519408
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22babdb0-6393-11ee-a10b-9345395d0398
+
+
+
diff --git a/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a91589bf7be87df95d1a025c45e1e5e77672f3b
--- /dev/null
+++ b/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.135
+ USER-0015-1274.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22c18e60-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f0fa2fa5c2c9c3e62cce2270fac7d055886c596
--- /dev/null
+++ b/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.15
+ 100.64.32.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041684
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22c305c0-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17ba3119c84119b7f87dae1ad935856344c49917
--- /dev/null
+++ b/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.28
+ 100.64.19.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363737
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22c3ae30-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f2dfc8d4c8cdb6fb385a8bac143d60f464e23a3
--- /dev/null
+++ b/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.248
+ 100.64.47.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692035463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22c545f0-3acb-11ee-a022-b5e9f791d58e
+
+
+
diff --git a/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f66f3946f684349fef1b5bf0e3713ade27dbd5c3
--- /dev/null
+++ b/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.170
+ 100.64.61.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22c7ca60-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a12d7cf744461117a44a0cebc56b119e3046c920
--- /dev/null
+++ b/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.34
+ 100.64.37.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.237
+ 100.64.56.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.238
+ 100.64.56.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.195
+ 100.64.29.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.38.158
+ 100.64.38.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.239
+ 100.64.56.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835165
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22c84680-1340-11ef-90d6-79b9e3bf2217
+
+
+
diff --git a/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecbdd3204237e1d8853e1bb6566e39482e25f8bb
--- /dev/null
+++ b/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.165
+ 100.64.22.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22cbc5f0-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3f8ec7c3647cf0bdc94bb21a99bc5f439d4ba4f
--- /dev/null
+++ b/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22d70ca0-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b550c57d2453aa7b806f8a035319c90950c7f1da
--- /dev/null
+++ b/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.15
+ 100.64.32.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041684
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22d7ed50-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..954d3074538210e86297e6d5bf07454adc0dec60
--- /dev/null
+++ b/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.135
+ USER-0015-1274.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622384
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22d898d0-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb9edb5b12b110ce14e1280571a05ced968ff969
--- /dev/null
+++ b/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.165
+ 100.64.22.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22d95a80-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dd8fa67fa82753030470c5e77e0c2cfb52f05f8
--- /dev/null
+++ b/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.95.87
+ USER-0015-2129.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105319
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22df0600-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105319
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22df0600-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105319
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22df0600-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105319
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 22df0600-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24be195ccfb477dc014a4f456276c56ecaa6543a
--- /dev/null
+++ b/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 22e58b90-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5a6e8cca042cb5be36b35ae7a27178718378972
--- /dev/null
+++ b/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,813 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.83
+ 100.64.12.83
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.84
+ 100.64.12.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.6
+ 100.64.12.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.147
+ 100.64.7.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.85
+ 100.64.12.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.86
+ 100.64.12.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.87
+ 100.64.12.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.89
+ 100.64.12.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.90
+ 100.64.12.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.91
+ 100.64.12.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.92
+ 100.64.12.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.93
+ 100.64.12.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.62
+ 100.64.12.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.94
+ 100.64.12.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.96
+ 100.64.12.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.97
+ 100.64.12.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.98
+ 100.64.12.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.99
+ 100.64.12.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec1cb0-675e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bdcd4f92dc08d0b367598f8bc277fba0ebd7837
--- /dev/null
+++ b/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.190
+ 100.64.18.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699208917
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22ec3780-7c09-11ee-8a78-ffddbc4b96f0
+
+
+
diff --git a/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6ddab20a7af4fd8ad16f051334093fe96766efc
--- /dev/null
+++ b/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.223
+ 100.64.15.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22f34730-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..297cc08975acb8848afb8a02fc283067bfe7898e
--- /dev/null
+++ b/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.49
+ 100.64.25.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 22f41010-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9177578ca40fe17cb968b4439f22f15b520c69e7
--- /dev/null
+++ b/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.53
+ 100.64.53.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.214
+ 100.64.48.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.46
+ 100.64.46.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.206
+ 100.64.46.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.54
+ 100.64.53.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.228
+ 100.64.3.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.241
+ 100.64.24.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098052
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 22f998a0-30ed-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdbba62b73920ea0dad3b8237808e0ac03d435a7
--- /dev/null
+++ b/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.223
+ 100.64.15.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23021440-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09297c6b19b031a886d5e1076c01591aaab3fb86
--- /dev/null
+++ b/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.90.65
+ 172.25.90.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.16
+ 100.64.92.16
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.133
+ 100.64.88.133
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666302166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23044a20-50c0-11ed-875b-db834c6ab2cd
+
+
+ INCIDENT_LINK
+ 1666302166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23044a20-50c0-11ed-875b-db834c6ab2cd
+
+
+ INCIDENT_LINK
+ 1666302166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23044a20-50c0-11ed-875b-db834c6ab2cd
+
+
+ INCIDENT_LINK
+ 1666302166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23044a20-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05ff6820358c519a92fb48cf77f3b0c1e64e828a
--- /dev/null
+++ b/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2308a880-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc582084fa808d2eac5a515935c9d837b17afab6
--- /dev/null
+++ b/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.49
+ 100.64.25.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622384
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2310bfd0-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36dbc05fc1d18722e84310d5d2ddc08ffc522943
--- /dev/null
+++ b/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.132.243
+ 172.21.132.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.72
+ 100.64.90.72
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.143
+ 100.64.95.143
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.144
+ 100.64.95.144
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.145
+ 100.64.95.145
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23127fa0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb0c3456d03cd8d6a1e6a7b641070d53a8fd682e
--- /dev/null
+++ b/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.237
+ 100.64.95.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23220770-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56bfa87754b3fa69982d7b3a07961930f35c1bf7
--- /dev/null
+++ b/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.237
+ 100.64.95.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23253bc0-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f418a590808b02bd7125c393a5e70896371a9898
--- /dev/null
+++ b/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.65
+ 100.64.59.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 23275ea0-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5573fc96995f3d98ed0d18b63a4ce0e70570f60
--- /dev/null
+++ b/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.59.65
+ 100.64.59.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 232d2b00-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad1e50394918720ee79b27a43a4f54e4e9e1b097
--- /dev/null
+++ b/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.65
+ 100.64.59.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 232d8a00-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c247c8c1454de8aa970f3c4552263274c75d11a0
--- /dev/null
+++ b/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.241
+ 100.64.95.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23325b20-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87946a89834cfec5ee6e7f1c6578cd3e1000985c
--- /dev/null
+++ b/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.241
+ 100.64.95.241
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 233652c0-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b1ad682c2d4ed266b6116313c8c9c68beb8a6f5
--- /dev/null
+++ b/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.234.64.242
+ 10.234.64.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.218.122
+ 172.26.218.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 233abf90-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88c54a792fe460c2855c5a5a8a28f2376419ec5b
--- /dev/null
+++ b/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.65
+ 100.64.59.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842391
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 233dddb0-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87e480e9d08cb8758d792595cf37f9287e170f86
--- /dev/null
+++ b/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.102
+ 100.64.17.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379331
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2343e430-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e2bdab20e035390a10ec2e6acf03afe37e4925c
--- /dev/null
+++ b/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.238
+ 100.64.95.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2346cd80-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58168bba12e53c482588f3a0ff6c84650ac79a3a
--- /dev/null
+++ b/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.111
+ 100.64.69.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.147
+ 100.64.70.147
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952841
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 234a8720-9e16-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70182ee13e15ce45a2faacbb0ccf3e2cf66024e1
--- /dev/null
+++ b/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.238
+ 100.64.95.238
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 234c99e0-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3c80103f29d549b36a508852440b278a7d5664d
--- /dev/null
+++ b/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664810525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 23504360-432f-11ed-b89e-1d3afc384aa8
+
+
+
diff --git a/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..caec457811b1853f6b6b2dc9dcad3fe73a070bdb
--- /dev/null
+++ b/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.49
+ 100.64.14.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379331
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2356f700-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4d8906bb53473627c4b245d0980ebc8838a8e80
--- /dev/null
+++ b/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,853 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.118
+ 100.64.12.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.119
+ 100.64.12.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.120
+ 100.64.12.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.121
+ 100.64.12.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.122
+ 100.64.12.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.123
+ 100.64.12.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.81
+ 100.64.8.81
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.31
+ 100.64.12.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.32
+ 100.64.12.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.34
+ 100.64.12.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.35
+ 100.64.12.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.36
+ 100.64.12.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.37
+ 100.64.12.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.38
+ 100.64.12.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.124
+ 100.64.12.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696936451
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2359f9b0-675e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65ace104c3e7d8777bd969229bf15780bbc34043
--- /dev/null
+++ b/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,581 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.179
+ 100.64.69.179
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.19.12
+ 100.64.19.12
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.180
+ 100.64.69.180
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.54.94
+ 100.64.54.94
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.1
+ USER-0015-1515.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.144
+ 100.64.16.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.11
+ HOST-12183
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.181
+ USER-0015-1529.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.37
+ USER-0015-1530.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614785
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23642900-097e-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8821936ce30bfe5acc2b3c821f243ea21007bf3
--- /dev/null
+++ b/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.126
+ 100.64.51.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.253
+ 100.64.36.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.127
+ 100.64.51.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.229
+ 100.64.2.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.128
+ 100.64.51.128
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23670170-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dbd595d57168715dfaa39062baf963bbcbf8d09
--- /dev/null
+++ b/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.20
+ 100.64.45.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694642938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 236fce20-5282-11ee-bc88-2ddcf292f958
+
+
+
diff --git a/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1a424995ae0bb79eb057338f4a3a9bf8c0548c1
--- /dev/null
+++ b/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.132
+ 100.64.51.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.133
+ 100.64.51.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.134
+ 100.64.51.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.135
+ 100.64.51.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..731ec9f239b4050dff8923ffc44e39dbeeb3b6fd
--- /dev/null
+++ b/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692035464
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 237bebc0-3acb-11ee-a022-b5e9f791d58e
+
+
+
diff --git a/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46136893be7afb09eb92152c2c9b3303da50ad9b
--- /dev/null
+++ b/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.203
+ 100.64.78.203
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ USER-0015-1622.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.204
+ 100.64.78.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656809431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23807020-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23807020-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23807020-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23807020-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+
diff --git a/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79cdd5892b4f0a20ce70e5c45f55779c442711de
--- /dev/null
+++ b/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.204
+ USER-0015-1338.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690722063
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2381bcb0-2ed9-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3c801fa2d28a01b2cbf504e7cc7cf42ab3cfb12
--- /dev/null
+++ b/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.234
+ 100.64.41.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.140
+ 100.64.51.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.224
+ 100.64.14.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.12
+ 100.64.2.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23920910-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4c835bbd508d835a151fc2b3946c19c9d9a3188
--- /dev/null
+++ b/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.142
+ 100.64.51.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.139
+ 100.64.20.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 239f2870-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 239f2870-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 239f2870-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 239f2870-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c444725b44fd300b952d04822768681371fb2439
--- /dev/null
+++ b/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434017
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23adfd00-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0746f9af7b3710c31531d4d94a6c6bf1602ccc5a
--- /dev/null
+++ b/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.65.77
+ USER-0015-2134.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.149
+ 100.64.95.149
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581237
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23af82f0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581237
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23af82f0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2060ebfe3c310532ac56801f9798ae828ba82bfb
--- /dev/null
+++ b/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.172
+ 100.64.61.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23b29f90-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..625cd2d3b1e4a2908c237d76f8a375ae38a82639
--- /dev/null
+++ b/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.55
+ USER-0015-1516.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686951082
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23b39dc0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951082
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23b39dc0-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abd30e8e07051883fe4c76e195af9fe807b31165
--- /dev/null
+++ b/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.172
+ 100.64.47.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575376
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23b7d520-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..644fecb312c0844b6fa3ea0b44e3dd5292386619
--- /dev/null
+++ b/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.172
+ 100.64.61.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040785
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23c82360-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5248ffc3be0d9f13cecadcfadd0fa13fbdff1df0
--- /dev/null
+++ b/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.172
+ 100.64.47.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575376
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23c84fe0-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5820f290b4e80d9242f08e4246575a07daf791a3
--- /dev/null
+++ b/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.74
+ USER-0015-1189.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287711
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23cb7470-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c15bdc428a77e7354807934ad356859b7fb394e
--- /dev/null
+++ b/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.70.142
+ 100.64.70.142
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.47.81
+ 100.64.47.81
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.135
+ 100.64.23.135
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.143
+ 100.64.70.143
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744695
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23cb9000-3826-11ee-b5a7-eb9164a8ca63
+
+
+
diff --git a/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a040838a5d5291ba665fc111cb4516c0de4e1a5
--- /dev/null
+++ b/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.2
+ 100.64.5.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.158
+ 100.64.55.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.159
+ 100.64.55.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.160
+ 100.64.55.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.9
+ 100.64.22.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.55.161
+ 100.64.55.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825288
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23d456c0-1329-11ef-aba1-33e212db0be8
+
+
+
diff --git a/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2569d509997c5ed9954ccacfa73157b6e1ea0736
--- /dev/null
+++ b/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.102
+ 100.64.64.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575377
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23d8a390-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..343c940af1bb101b5dd1f9dd761a54c1b6f20ff5
--- /dev/null
+++ b/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694040785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23da99f0-4d08-11ee-82ee-d76cd040b93d
+
+
+
diff --git a/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..457cab5534a6249c049e9be902d94a6156735aed
--- /dev/null
+++ b/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.74
+ USER-0015-1189.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 23e08310-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cfbf2f4f9d41fe2eb457d9b451d25842c3ae4dc
--- /dev/null
+++ b/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.246
+ 100.64.22.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4db8ce41190c4e8e7fafde6cb21133747fddce4c
--- /dev/null
+++ b/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462481
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f41720-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d488cd74eeadcbe1f70c2e968cc66934031229d
--- /dev/null
+++ b/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.110
+ HOST-13623
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655127093
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f63640-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127093
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f63640-eb1d-11ec-80a1-dd24f7271411
+
+
+
diff --git a/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6228392ce7f1e5430d0a8a9dbf312e833df1bcb5
--- /dev/null
+++ b/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.54
+ 100.64.13.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.210
+ 100.64.6.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.120
+ 100.64.46.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.121
+ 100.64.46.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.122
+ USER-0015-1357.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.196
+ 100.64.38.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.108
+ 100.64.8.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.38
+ 100.64.6.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.123
+ 100.64.46.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.166
+ 100.64.3.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.124
+ 100.64.46.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.191
+ 100.64.4.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 23f88250-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e85fd2ac6d51e140164bcf745be770e91db21831
--- /dev/null
+++ b/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.1
+ 100.64.11.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23f884b0-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71eda683b87c54ef734da33e0e97e80b4b9de5df
--- /dev/null
+++ b/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.246
+ 100.64.22.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6296cb5f51267097805dd5e582873041bbcf26ba
--- /dev/null
+++ b/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.130
+ 100.64.46.130
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.131
+ 100.64.46.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.132
+ 100.64.46.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.133
+ 100.64.46.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.134
+ USER-0015-1358.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24050570-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb4253ad21ac01a0f01eb71ba066d054241000ac
--- /dev/null
+++ b/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.247
+ 100.64.22.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379332
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24070d20-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d1fa3932a83ac562b83b8c52c0b9cdcac216649
--- /dev/null
+++ b/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.1
+ 100.64.11.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24083c20-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d620376c65512eed050349bf21ee821db6beb8b
--- /dev/null
+++ b/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.136
+ 100.64.19.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693801126
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 240f6a20-4ada-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..404357b3a84e88adf9c3f0ecc75e0dbd4d0950e8
--- /dev/null
+++ b/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.204
+ 100.64.31.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 240fdc80-1a4c-11ee-a525-9fcef38978a9
+
+
+ INCIDENT_LINK
+ 1688462482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 240fdc80-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ac50b7b36c686ddbdb91b62fb6116716e3f5bbb
--- /dev/null
+++ b/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.140
+ 100.64.46.140
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.136.143.35
+ 10.136.143.35
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.141
+ 100.64.46.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24118890-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24118890-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24118890-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105355
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24118890-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0820877b89e764b6f8555d9b4bf35078bd5df04e
--- /dev/null
+++ b/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.247
+ 100.64.22.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379333
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2415da30-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e78c6883193112e0e6c538550b0f149d0e655eec
--- /dev/null
+++ b/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.5
+ USER-0015-1304.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 24183ff0-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbf5c2254208a1d8c15c885620da240b82972161
--- /dev/null
+++ b/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.123
+ 100.64.66.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2418b730-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..911bd2a51a733778bcddb7816d7770a19d77888f
--- /dev/null
+++ b/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.119
+ 100.64.81.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.255
+ 100.64.12.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687646008
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 241f44a0-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646008
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 241f44a0-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646008
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 241f44a0-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646008
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 241f44a0-12df-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b35ac87291cdbff1bae8d821bfd719c2675f7ace
--- /dev/null
+++ b/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.250
+ 100.64.22.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379333
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f2f056d5aef8001c9987568a288b8a6231d9974
--- /dev/null
+++ b/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.38
+ 100.64.24.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1714534222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24295b80-076b-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd134bcd4cc940c2fa3652c5efad540b7f27d04c
--- /dev/null
+++ b/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.123
+ 100.64.66.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708774671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 242cdb70-d309-11ee-8784-05d0e5a99247
+
+
+
diff --git a/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fca0783c3393df7f65db252467befd91ef8cb215
--- /dev/null
+++ b/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.43
+ 100.64.38.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 242de060-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab27845336c861ab003bad7f0f139cfe5977bdc9
--- /dev/null
+++ b/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.250
+ 100.64.22.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379333
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24357020-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf22e47b40ad95679bc63d52d6f7c5a3ba236a92
--- /dev/null
+++ b/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.205
+ 100.64.78.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.92
+ USER-0015-1614.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656809432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24382760-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24382760-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+
diff --git a/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..348c72db16f0816de4f3abdcdd9bb8253d7a3fc3
--- /dev/null
+++ b/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.43
+ 100.64.38.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710041686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24449cb0-de8f-11ee-a3b8-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35cbf8c6cb2164ad9f292a8cd45bd190a3b8d2cd
--- /dev/null
+++ b/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.213
+ 100.64.10.213
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2448d670-ab75-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b18faa3713086f61d77ccea4214f4f4c23995650
--- /dev/null
+++ b/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.235
+ 100.64.11.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.202
+ 100.64.56.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.244
+ 100.64.20.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.203
+ 100.64.56.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.204
+ 100.64.56.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.205
+ 100.64.56.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.206
+ 100.64.56.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.87
+ 100.64.48.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.57
+ 100.64.16.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.207
+ 100.64.56.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.129
+ 100.64.32.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.208
+ 100.64.56.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.76
+ 100.64.18.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.209
+ 100.64.56.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.83
+ 100.64.5.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+ INCIDENT_LINK
+ 1690560574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 244d08d0-2d61-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50d0624af619bc40376ab7a8d82678292e77c98b
--- /dev/null
+++ b/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.213
+ 100.64.10.213
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275512
+ malicious
+ 0.83125
+ 0.83125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 244ddf80-ab75-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc5c1aab05e4a97b99bb386ce41137630b9b58c9
--- /dev/null
+++ b/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.14
+ 100.64.93.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2450c5b0-ab75-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..921fb89d6992a59c23cc386b3dd4cf5b5c1fc8be
--- /dev/null
+++ b/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.115
+ 100.64.4.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703379333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83
+
+
+
diff --git a/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dce0828bc03ef8ca3f2187929beed8849ad588eb
--- /dev/null
+++ b/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.5.80
+ 172.29.5.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.14
+ 100.64.87.14
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691917783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2469cab0-39b9-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2469cab0-39b9-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..242539ca157aeed7a2fc18273016034205d011e0
--- /dev/null
+++ b/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.77
+ 100.64.22.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.138
+ 100.64.90.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.139
+ 100.64.90.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.90.140
+ 100.64.90.140
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.196
+ 100.64.24.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.46
+ 100.64.40.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.34.131
+ 100.64.34.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.18
+ 100.64.2.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.12
+ 100.64.10.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.141
+ 100.64.90.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.142
+ 100.64.90.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.143
+ 100.64.90.143
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.165
+ USER-0015-1449.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.144
+ 100.64.90.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.136
+ 100.64.90.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.145
+ 100.64.90.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022421
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24732100-9eb8-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..628f52c2c81320451b690a195d9cbc3b17a0884b
--- /dev/null
+++ b/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.139
+ HOST-9960
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688982173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2473ae90-1f06-11ee-984e-6dd184c65476
+
+
+
diff --git a/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92c6a7c8533124ad8f7696207f9b7e6c9f3ee4cc
--- /dev/null
+++ b/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.158
+ 100.64.36.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.159
+ 100.64.36.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.160
+ 100.64.36.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.161
+ 100.64.36.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.162
+ 100.64.36.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.136
+ 100.64.14.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.163
+ 100.64.36.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.106
+ 100.64.8.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.164
+ 100.64.36.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.165
+ 100.64.36.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.167
+ 100.64.36.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.190
+ 100.64.18.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.168
+ 100.64.36.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.169
+ 100.64.36.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+ INCIDENT_LINK
+ 1696519411
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24773ac0-6393-11ee-a10b-9345395d0398
+
+
+
diff --git a/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff95c9952bb234e7e4ac6933b7c02956aaf9a292
--- /dev/null
+++ b/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 247db980-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b8ebbf215b755ee5e11f497ee30163e836a0ac0
--- /dev/null
+++ b/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.61
+ 100.64.86.61
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715877259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 249ccbe0-13a2-11ef-ad44-1f39f7953267
+
+
+
diff --git a/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04b0bfea3cde4548dca78473a8313b396a8cfec0
--- /dev/null
+++ b/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874245
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 24aac790-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8db2d80f6929d1bb7d33994858a361cbe9c31974
--- /dev/null
+++ b/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24ae3f60-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8584591ea183377bf66126046d0fd90e235656e
--- /dev/null
+++ b/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702874245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24bb6960-9d5f-11ee-8404-258d9cb65446
+
+
+
diff --git a/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db31cc6c27a211ebbab9525aa12a1ed7315595a1
--- /dev/null
+++ b/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.161
+ 100.64.47.161
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.162
+ 100.64.47.162
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.238
+ 100.64.8.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.217
+ 100.64.35.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.163
+ 100.64.47.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.164
+ 100.64.47.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.165
+ 100.64.47.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24cbac90-22ca-11ee-a717-3b672dfcef5e
+
+
+
diff --git a/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e361521dccb58e0e65318f3422580b46ec60bdb
--- /dev/null
+++ b/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.7
+ 100.64.35.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24cc74c0-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e13e9e9c035b7840854527ef38f5608091cf7b47
--- /dev/null
+++ b/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.31.217
+ 100.64.31.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685371824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24cfd900-fe30-11ed-b9d7-d503d3f2ee6a
+
+
+
diff --git a/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..439db90ffa52c2b02b4a8a4249792e62304cebba
--- /dev/null
+++ b/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.127
+ 100.64.44.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.128
+ 100.64.44.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695784114
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24d62690-5ce3-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784114
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24d62690-5ce3-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784114
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24d62690-5ce3-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784114
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24d62690-5ce3-11ee-888f-c5a21ae2b888
+
+
+
diff --git a/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..324d2469db0d3411489204e283ea2d940965e18c
--- /dev/null
+++ b/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.7
+ 100.64.35.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 24dbb700-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7a6b8b06416ef39864b4a933c0bbc989d51c0ba
--- /dev/null
+++ b/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.117
+ 100.64.66.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013728
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24e35600-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8131f2a4aef56cdc465fc27901833fb1f2664a0
--- /dev/null
+++ b/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.232
+ 100.64.25.232
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.234
+ 100.64.25.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.18
+ 100.64.24.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24e3f340-456b-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2de2ed437cc40836cb1bb0853696e110b5e74b8a
--- /dev/null
+++ b/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.177
+ 100.64.65.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24e8a780-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7710d45da2bc0f293fa9a4fc44cc781059bd8f91
--- /dev/null
+++ b/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.238
+ 100.64.25.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.239
+ 100.64.25.239
+ ["Exploiting Host"]
+ 0.814375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.14
+ 100.64.6.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.240
+ 100.64.25.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.241
+ 100.64.25.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.242
+ 100.64.25.242
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.181
+ 100.64.23.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.243
+ 100.64.25.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.244
+ 100.64.25.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.245
+ 100.64.25.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.246
+ 100.64.25.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.247
+ 100.64.25.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.248
+ 100.64.25.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.201
+ 100.64.25.201
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.249
+ 100.64.25.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203697
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 24f09d70-456b-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeab76411a58a80644cc5688ae8c080ae8039125
--- /dev/null
+++ b/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.104
+ 100.64.34.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.170
+ 100.64.47.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.171
+ 100.64.47.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.21
+ USER-0015-1369.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.172
+ 100.64.47.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.173
+ 100.64.47.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.174
+ 100.64.47.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689396209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 24f1ab20-22ca-11ee-a717-3b672dfcef5e
+
+
+
diff --git a/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1deafe0ad67e9c12c596d81fe289a03e01fee7ac
--- /dev/null
+++ b/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.117
+ 100.64.66.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24f641c0-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5546eb7c05a20c0d44f59c50837dab6e3c2e129
--- /dev/null
+++ b/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.177
+ 100.64.65.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24f79ba0-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ced41d504ab150202e45c2a46d52a1704bf14e98
--- /dev/null
+++ b/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.247
+ 100.64.18.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 24fda320-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba80ba21f25ed6b0d573bb778410886c3ad9f5ef
--- /dev/null
+++ b/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.51
+ 100.64.8.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25043e30-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ef446b1371d91bbe1280b7198e80dc0ea265713
--- /dev/null
+++ b/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.179
+ 100.64.65.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842394
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25081660-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96f6f34fa63ebcfd7f1fe8e9a9372aa785613a91
--- /dev/null
+++ b/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.119
+ 100.64.66.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013728
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2508df60-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..878eba0df6beaf18c899c2112081fc58b5c32e2f
--- /dev/null
+++ b/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.65
+ 100.64.47.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700591041
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2510a3e0-889b-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36f95bc1ae946cf8ec9aaa73c295f9e4ee1d5686
--- /dev/null
+++ b/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.76
+ USER-0015-1190.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691287713
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25149640-33fe-11ee-b117-451e0594ac2f
+
+
+
diff --git a/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4d9b8af99657ad2ce6bf0d465a63b53b672da85
--- /dev/null
+++ b/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.51
+ 100.64.8.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434019
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25168db0-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3aacdfe7fe5162e37da5c30655e8afca200e8503
--- /dev/null
+++ b/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.119
+ 100.64.66.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013729
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 25190c00-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc896849b3f3f67a70e6ec12e87ca698de32cb17
--- /dev/null
+++ b/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml
@@ -0,0 +1,171 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.149
+ 100.64.38.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.150
+ 100.64.38.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.151
+ 100.64.38.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+ INCIDENT_LINK
+ 1702958857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 251bbc50-9e24-11ee-9ce0-3dd61bd6a247
+
+
+
diff --git a/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b023874b66c910a728aac7ab238e9a915bf5208f
--- /dev/null
+++ b/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.65
+ 100.64.47.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700591042
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2521e1f0-889b-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0dc087eb9a44b494202381a587b14427c158299
--- /dev/null
+++ b/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1686951084
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 252248f0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951084
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 252248f0-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a122046c3678d78083e7483023f3a56f5dfd4ff
--- /dev/null
+++ b/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 252cc970-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd45a0196fddf2e0e042046fb750679d80b1dde4
--- /dev/null
+++ b/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.56
+ 100.64.65.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.250
+ HOST-13014
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.162
+ 100.64.72.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.163
+ 100.64.72.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.53
+ 100.64.1.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.164
+ 100.64.72.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.165
+ 100.64.72.165
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.166
+ 100.64.72.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.8.207
+ 100.64.8.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.12.91
+ 100.64.12.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25373160-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..501fba8a023b0870992790446c3c27b40b4269ac
--- /dev/null
+++ b/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.9
+ 100.64.35.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 253bb150-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 253bb150-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c89d5f908072b9adc82a9a491ae1b10becfd405f
--- /dev/null
+++ b/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.233
+ 100.64.71.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 253bec80-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 253bec80-0e2f-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb6d3c7a9c73805961b457fba9cc77c361bc9a21
--- /dev/null
+++ b/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.53
+ 100.64.8.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434019
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25484c10-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6800ac2c08623903ad42e761451853e924a6910
--- /dev/null
+++ b/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 254c3850-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe13c05a04dcec0ef326173cd70196366639129a
--- /dev/null
+++ b/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.9
+ 100.64.35.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 254c5320-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b15b3b21fc0b6a31e67d1a261339469e895ee9ef
--- /dev/null
+++ b/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.13.25
+ 192.168.13.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch","FireEye Endpoint Security (HX Series)"]
+
+
+ HOST
+ 100.64.72.169
+ 100.64.72.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch","FireEye Endpoint Security (HX Series)"]
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25512200-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25512200-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcadf952b65006d9766308802a29a423a8ba48e7
--- /dev/null
+++ b/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.219
+ 100.64.70.219
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.45.252
+ 100.64.45.252
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686198606
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2553c350-05b5-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198606
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2553c350-05b5-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198606
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2553c350-05b5-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198606
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2553c350-05b5-11ee-9e30-fd3f69b84945
+
+
+
diff --git a/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6d9cce1bd3e636fcdaf184d22aa085d62a99cfb
--- /dev/null
+++ b/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.82
+ 100.64.30.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.62.9
+ 100.64.62.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.43
+ 100.64.80.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130614
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 255763c0-0e2f-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d43e32759b75e2dba9c32cd0873b837c4ed51690
--- /dev/null
+++ b/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.136
+ 100.64.14.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696519413
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 255bf570-6393-11ee-a10b-9345395d0398
+
+
+
diff --git a/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12c9b854af72225b87c6212044c9d4c033d47127
--- /dev/null
+++ b/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319565
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 255fbc70-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1362e9627edf6d58195ea264759916f8992e1ac
--- /dev/null
+++ b/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610660
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25669e20-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4406743fcaac4b6bef32d7d601f38fa83bd9c5a3
--- /dev/null
+++ b/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.2
+ 100.64.7.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25670df0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25670df0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25670df0-3937-11ef-a411-6df7c82319e6
+
+
+
diff --git a/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08ec868afbcd4789683ad08e42601d5a7076e2a1
--- /dev/null
+++ b/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.21.56
+ 100.64.21.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25687a90-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25687a90-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25687a90-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25687a90-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87e59095493e027ea2988f4107a2a6ea61e74d2f
--- /dev/null
+++ b/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.42
+ 100.64.9.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319565
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2577b140-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..839c7455d9d15f93c14ce9fc596788394a3c432e
--- /dev/null
+++ b/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.55
+ 100.64.8.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434020
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25780ea0-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f3dbc80760001aba913d5564adef8b86255fb36
--- /dev/null
+++ b/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 257a9b50-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2612baef2f2e8c40b34352af540e37fabcc55ee
--- /dev/null
+++ b/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.118
+ 100.64.33.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.246
+ 100.64.51.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.91
+ 100.64.10.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.162
+ 100.64.19.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.49
+ 100.64.14.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.218
+ 100.64.52.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.196
+ 100.64.7.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.219
+ 100.64.52.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.220
+ 100.64.52.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.221
+ 100.64.52.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.222
+ 100.64.52.222
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.79
+ 100.64.27.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.223
+ 100.64.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25808610-9999-11ee-9c88-85e8bec5492c
+
+
+
diff --git a/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79fa5799d0639ccadabd895544d823f851254d19
--- /dev/null
+++ b/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.111
+ 100.64.74.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.64.106
+ 100.64.64.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.223
+ USER-0015-1406.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.112
+ 100.64.74.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ USER-0015-1615.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.113
+ USER-0015-1675.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.114
+ 100.64.74.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.115
+ USER-0015-1676.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2582a2a0-eb1d-11ec-80a1-dd24f7271411
+
+
+
diff --git a/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71cad329ec58bbc8aeac1297ef213521235100b6
--- /dev/null
+++ b/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.42
+ 100.64.9.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319566
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25840d50-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22fb5521d7ce666cb2c84d7f1b162bda5040a000
--- /dev/null
+++ b/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.57
+ 100.64.8.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 258b6f90-0f9a-11ef-ba57-a7da65bcbce4
+
+
+ INCIDENT_LINK
+ 1715434020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 258b6f90-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e5cb73d7bdf47f05bba042b117826c0e8b8fb4b
--- /dev/null
+++ b/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 258fa610-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94ac8698cb238bd6e9a1e58b6ba26401642d8628
--- /dev/null
+++ b/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.64
+ 100.64.41.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.111
+ 100.64.22.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.39
+ 100.64.2.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.65
+ 100.64.41.65
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.91
+ 100.64.15.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.66
+ 100.64.41.66
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2592b1d0-3937-11ef-a411-6df7c82319e6
+
+
+
diff --git a/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbde43b9bb82161658b05d64a493dfb4eacc9f88
--- /dev/null
+++ b/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688610661
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2593a190-1ba5-11ee-8306-735a9f6c811f
+
+
+
diff --git a/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6588e4be9dcbd70b2b28b557562fee317038d786
--- /dev/null
+++ b/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.116
+ USER-0015-1677.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ USER-0015-1622.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.117
+ USER-0015-1678.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+ INCIDENT_LINK
+ 1655127095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259a4950-eb1d-11ec-80a1-dd24f7271411
+
+
+
diff --git a/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcdf50c0eb133accac5c190e3b9495b153cf6aa0
--- /dev/null
+++ b/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.57
+ 100.64.8.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715434020
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 259b4e10-0f9a-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86bfc513ced5458283f3c5b8ac1e3c665baec755
--- /dev/null
+++ b/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319566
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 259c0220-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae1256e1bc1829db992e6acd8231901a7893061b
--- /dev/null
+++ b/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.46
+ 100.64.9.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 25aa5a00-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97e8977b67dc55999927e9dee1a7783998a151c6
--- /dev/null
+++ b/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.30
+ 100.64.19.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363742
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 25b1a660-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0a510930944d1d3ced5bf605c1468169ae4cacd
--- /dev/null
+++ b/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.27
+ 100.64.25.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712211077
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25b33fb0-f24a-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcbf0576b8f922bc4e05581b451aa6c06739e91c
--- /dev/null
+++ b/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.46
+ 100.64.9.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 25b8b1e0-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..211f90fb8b023f6fba0b97a2f5e7504915e76725
--- /dev/null
+++ b/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.93
+ 100.64.35.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25ba9ef0-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51bf2abea000f0a48c806620e990a496eca3ec88
--- /dev/null
+++ b/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.30
+ 100.64.19.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704363742
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25c15dd0-aaeb-11ee-8329-a9b1c800624c
+
+
+
diff --git a/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6651881492a0d022ee61214db15e220f14a0894
--- /dev/null
+++ b/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.27
+ 100.64.25.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712211077
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25cd7e70-f24a-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e90426af7cce7051f4d007e7a620334c048a54a0
--- /dev/null
+++ b/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.46
+ 100.64.59.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 25d6ebd0-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48ed35826571f1eaa351c7593bf6e6104773bcf4
--- /dev/null
+++ b/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.48
+ 100.64.59.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742454
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 25ea9ae0-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e1bf78192f2deb2d09db32a2b2ee291cdb98adf
--- /dev/null
+++ b/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.128
+ 100.64.54.128
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688721042
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 25f1da60-1ca6-11ee-8a30-871cf58c099a
+
+
+
diff --git a/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5adb9dfd4d696ce90f6a70f9d74db502df254a8d
--- /dev/null
+++ b/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.215
+ 100.64.19.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705649
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 26022470-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4448003a0796a109c8be487cb3ae7351c44269d0
--- /dev/null
+++ b/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.229
+ 100.64.35.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.230
+ 100.64.35.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.231
+ 100.64.35.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.232
+ 100.64.35.232
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.233
+ 100.64.35.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.234
+ 100.64.35.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.20
+ 100.64.23.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.107
+ 100.64.19.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.235
+ 100.64.35.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.236
+ 100.64.35.236
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.237
+ 100.64.35.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.238
+ 100.64.35.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.239
+ 100.64.35.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.240
+ 100.64.35.240
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.241
+ 100.64.35.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.242
+ 100.64.35.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.243
+ 100.64.35.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.244
+ 100.64.35.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940023
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26033af0-5e4e-11ee-8592-6935d79f5b6b
+
+
+
diff --git a/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml b/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33f709a4aeaed7a113d1dc4a6b4cbd5a4b482146
--- /dev/null
+++ b/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.135
+ 100.64.29.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1697932458
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26109070-706d-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932458
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26109070-706d-11ee-bf4b-5f6b66a218e8
+
+
+
diff --git a/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3ec4e0f0d091d795aee5e9ddfa032f79d96a3fb
--- /dev/null
+++ b/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 26141be0-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d38970c8357734e04fb65cb6ebccb9843518ec4a
--- /dev/null
+++ b/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.181
+ 100.64.65.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696842396
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 261ce1c0-6683-11ee-91f9-f367d99d3c80
+
+
+
diff --git a/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..390cbc03b1febd9224f60da542e2dbc07fa64d0b
--- /dev/null
+++ b/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.142
+ 100.64.14.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431298
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2623b560-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8d659c2467ed9c93912204c6799ba36d9736245
--- /dev/null
+++ b/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26240450-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24b1446b42bfc56670c420ad073f08c576393ea3
--- /dev/null
+++ b/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2634cd30-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d91ca549d8f5ba33b353a0d92748885b528f4a94
--- /dev/null
+++ b/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.50
+ 100.64.59.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 263d4ec0-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c0954e4f1ecf3da6bfda90d1e92b88cfa809c85
--- /dev/null
+++ b/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.106
+ 100.64.17.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.40
+ 100.64.21.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529930
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 263f00a0-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d0d50c59683d190e4bc3ef05e5a08668ebeab7d
--- /dev/null
+++ b/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705650
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26459610-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e26f2b2c67d73a464e8a0a30c4a70cbb0b0fe250
--- /dev/null
+++ b/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.236
+ 100.64.79.236
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1669680593
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2647b400-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680593
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2647b400-6f7a-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1c8d0084e5fc42261e708b4166dbf6dc87d79b2
--- /dev/null
+++ b/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml
@@ -0,0 +1,767 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.206
+ 100.64.78.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.207
+ USER-0015-1794.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.208
+ 100.64.78.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.209
+ USER-0015-1795.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.43.63
+ 100.64.43.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.210
+ 100.64.78.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.211
+ 100.64.78.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.212
+ USER-0015-1796.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.213
+ 100.64.78.213
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.27.178
+ 100.64.27.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.252
+ 100.64.74.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.79
+ 100.64.75.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.214
+ USER-0015-1797.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.215
+ 100.64.78.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.216
+ 100.64.78.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.217
+ 100.64.78.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.218
+ 100.64.78.218
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.219
+ 100.64.78.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 264e3620-fa6a-11ec-afb6-b9a2c990c2ed
+
+
+
diff --git a/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6167804505ccc5947b1779b61cdb4913b3275341
--- /dev/null
+++ b/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.50
+ 100.64.59.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2651e830-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55363f186a7e43b238c78c19a8f0f2cf594b4696
--- /dev/null
+++ b/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.134
+ 100.64.48.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622390
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2654a030-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..700bd9c89ced3d6bafff6e37b46e3a8acd5751dd
--- /dev/null
+++ b/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.149
+ 100.64.11.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26555c90-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a5e72ea590bd1bdcf210151bba3129bd58737ab
--- /dev/null
+++ b/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705650
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 265db1f0-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..303e7b5944b8e1aac0b8cc7681ca9d2628118f52
--- /dev/null
+++ b/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.52
+ 100.64.59.52
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 265eb970-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7dd56e11a2739be62c7b4830e508cbd33224cdec
--- /dev/null
+++ b/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.149
+ 100.64.11.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2665d750-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7df02aa342d2917d66f28a679b25e426f2a81d7
--- /dev/null
+++ b/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.52
+ 100.64.59.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 266bb1c0-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1aee13a6db1d79afe43eb821220fdb01c950e865
--- /dev/null
+++ b/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.134
+ 100.64.48.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622390
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 266da670-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29b8c2a46c8f3f6f493b75e440e498bbae5372eb
--- /dev/null
+++ b/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.234
+ 100.64.44.234
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.25.5.56
+ 10.25.5.56
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720645535
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26797a60-3f00-11ef-a3c1-8be1e2d87500
+
+
+ INCIDENT_LINK
+ 1720645535
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26797a60-3f00-11ef-a3c1-8be1e2d87500
+
+
+
diff --git a/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aeb21188be46bf4352ec5ae559a44446ac3724d4
--- /dev/null
+++ b/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml
@@ -0,0 +1,395 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.5
+ 100.64.36.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.6
+ 100.64.36.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.193
+ 100.64.25.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.7
+ 100.64.36.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.205
+ 100.64.9.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 267d7400-5e4e-11ee-8592-6935d79f5b6b
+
+
+
diff --git a/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81d9866d9cc46448d0f1b55b3bafc90f35a5b393
--- /dev/null
+++ b/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.11
+ 100.64.35.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2684d320-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml b/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b0435547f68daf4750f37bb0a32b0dd1ea8e8e7
--- /dev/null
+++ b/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml
@@ -0,0 +1,735 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.185
+ USER-0015-1531.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.186
+ 100.64.69.186
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.48.140
+ USER-0015-1532.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.187
+ 100.64.69.187
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.11
+ HOST-12183
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.41.204
+ 100.64.41.204
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.76
+ USER-0015-1533.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.48.7
+ 100.64.48.7
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.224
+ 100.64.68.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+ INCIDENT_LINK
+ 1689025126
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c
+
+
+
diff --git a/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdfbb1aad72b556d933787483b41506f61f98afc
--- /dev/null
+++ b/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.211.94
+ 172.21.211.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.67
+ 100.64.91.67
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720449255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 268b8c70-3d37-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 268b8c70-3d37-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..159a0f4b9e87b0f72ad1343f22795db3281c666d
--- /dev/null
+++ b/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.54
+ 100.64.59.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695742455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 268d6a90-5c82-11ee-b726-6981dbb03ad6
+
+
+
diff --git a/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..812306a93cb2818a82c2a862c2616e15ac49f130
--- /dev/null
+++ b/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237831
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2691d850-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8fc6836b138cb4c6c17a21a8dc6d222042ef45c
--- /dev/null
+++ b/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.11
+ 100.64.35.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2694ffc0-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..138f5562ae3a17f280f30539acf4533789e40914
--- /dev/null
+++ b/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.128
+ 100.64.48.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697319567
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26968ec0-6ada-11ee-947e-5d70e209d5c7
+
+
+
diff --git a/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05106649e5f8b74638f7474dbddf9348111aa7e6
--- /dev/null
+++ b/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237831
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 26a0cc70-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..895bee1eaab3a7007b99d4adf7168fbca2c481be
--- /dev/null
+++ b/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.230
+ 100.64.49.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 26b47b80-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92626ce1e878959157228023ecd8c774b6e1b2e7
--- /dev/null
+++ b/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.215
+ 100.64.54.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 26b843e0-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..601938bd754eb54c49b4c95050afa2186fc49f2a
--- /dev/null
+++ b/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.254
+ 100.64.13.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575381
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26c62690-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e9e45e434318f715116a5010fe0d76dd4b1e91f
--- /dev/null
+++ b/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.141.136.106
+ 10.141.136.106
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","AWS VPC Security","Windows Logs","Windows Active Directory"]
+
+
+ HOST
+ 192.0.2.120
+ 192.0.2.120
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.222.184.83
+ 10.222.184.83
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1672286351
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26d31840-872d-11ed-bb4c-dd95bc70531e
+
+
+ INCIDENT_LINK
+ 1672286351
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26d31840-872d-11ed-bb4c-dd95bc70531e
+
+
+ INCIDENT_LINK
+ 1672286351
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26d31840-872d-11ed-bb4c-dd95bc70531e
+
+
+ INCIDENT_LINK
+ 1672286351
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 26d31840-872d-11ed-bb4c-dd95bc70531e
+
+
+
diff --git a/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9adfbd8b2f1bce10ab680dc6234a2300f4f638a8
--- /dev/null
+++ b/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.254
+ 100.64.13.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695575382
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df
+
+
+
diff --git a/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd2ba095ab7c4b49e45ac096a63376bc77c3f685
--- /dev/null
+++ b/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.161.37
+ 192.168.161.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.53
+ 100.64.88.53
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675888969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26e4d000-a7f1-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26e4d000-a7f1-11ed-af31-070b715d9bbb
+
+
+
diff --git a/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30961917affe974fb0abf75c01acc11f46448fac
--- /dev/null
+++ b/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.219
+ 100.64.19.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26e75450-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26eb7f30ed03eb99c4d104a5d74dd3d3233153c8
--- /dev/null
+++ b/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.121
+ 100.64.69.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701684973
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26e97730-928e-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684973
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26e97730-928e-11ee-92fb-e74bdedb3c0b
+
+
+
diff --git a/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbb9eeb95b8b87c283d5b79a5d0eb412505c73fc
--- /dev/null
+++ b/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.232
+ 100.64.49.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 26f15d70-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a8dedaa474db6b78faf0b67b51551d8bf302f2a
--- /dev/null
+++ b/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.219
+ 100.64.19.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705651
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 26f7f620-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93b5ce69084c38275716ffdf698dbdb6044478a4
--- /dev/null
+++ b/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.232
+ 100.64.49.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27002a80-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ca1a5993771ba4cbf36d9552f8756a5129730df
--- /dev/null
+++ b/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.12
+ 100.64.36.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.13
+ 100.64.36.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.14
+ 100.64.36.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.15
+ 100.64.36.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.200
+ 100.64.5.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.5
+ 100.64.36.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.6
+ 100.64.36.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.193
+ 100.64.25.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.7
+ 100.64.36.7
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.205
+ 100.64.9.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.16
+ 100.64.36.16
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.17
+ 100.64.36.17
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.163
+ 100.64.9.163
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940025
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27017110-5e4e-11ee-8592-6935d79f5b6b
+
+
+
diff --git a/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74b9c2c1f84d1ba06944548fff73b255bb7f937b
--- /dev/null
+++ b/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431300
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27038e10-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c464f199626dc1004ae562236e8ea0c9d1e21786
--- /dev/null
+++ b/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.127
+ 100.64.13.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685221934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 270a7850-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 270a7850-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 270a7850-fcd3-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..449c1739867d603e55b31979a52c628c6df1ad72
--- /dev/null
+++ b/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.224
+ 100.64.68.224
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.746875
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.18.51
+ 100.64.18.51
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.224
+ 100.64.70.224
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686199039
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 270b1ad0-05b6-11ee-9e30-fd3f69b84945
+
+
+
diff --git a/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59bfad1e6bf1015f8fa14d358ae4d69ba09a3b7c
--- /dev/null
+++ b/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.136
+ 100.64.48.136
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687622391
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 271b2480-12a8-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..755f117579fe993716119665d53901d8171e0472
--- /dev/null
+++ b/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27203dd0-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66a0ab9a4f7b7fb483c1e260db9aade13be16a24
--- /dev/null
+++ b/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.212
+ 100.64.3.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27263210-5314-11ee-bb93-954a0464a100
+
+
+ INCIDENT_LINK
+ 1694705651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27263210-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b60074c33799989d7317e07c0f32878af2c0aae1
--- /dev/null
+++ b/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.212
+ 100.64.3.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694705651
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2736faf0-5314-11ee-bb93-954a0464a100
+
+
+
diff --git a/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d01149bedcd822053660a25302b0f0841eef433c
--- /dev/null
+++ b/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.82
+ 100.64.40.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2738aea0-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..987156dd48869a24844bee1b8c37759a9c8c3203
--- /dev/null
+++ b/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.95
+ 100.64.35.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2743d700-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed8ec6be775a16a68151de4eff59c0d62bdf9ac0
--- /dev/null
+++ b/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.13
+ 100.64.35.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.14
+ 100.64.35.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.15
+ 100.64.35.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.16
+ 100.64.35.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.223
+ 100.64.27.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.17
+ 100.64.35.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.9
+ 100.64.22.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.18
+ 100.64.35.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.19
+ 100.64.35.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.20
+ 100.64.35.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.21
+ 100.64.35.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.22
+ 100.64.35.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.23
+ 100.64.35.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.24
+ 100.64.35.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.25
+ 100.64.35.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.26
+ 100.64.35.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+ INCIDENT_LINK
+ 1695178098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27453cf0-5760-11ee-b4dd-e56c30c12cd4
+
+
+
diff --git a/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d46c284ca2433432e12dda37ac836a5ba8705b2b
--- /dev/null
+++ b/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.44
+ 100.64.51.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 274949a0-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb63fcfb6e09db6714cbcfc4883d298545b4ee38
--- /dev/null
+++ b/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.239
+ 100.64.13.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 274faa10-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2053c90fe5855a233f2e623ed7c04fa14667da41
--- /dev/null
+++ b/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.223
+ 100.64.86.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27535080-2a82-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40a35c7908fd64562bc24a8a166bee044a70b0f5
--- /dev/null
+++ b/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.171
+ 100.64.72.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.172
+ 100.64.72.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.38.99
+ 100.64.38.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.17.105
+ 100.64.17.105
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.104
+ 100.64.10.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+ INCIDENT_LINK
+ 1685772549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2754e140-01d5-11ee-8c41-374f8f3a6a1c
+
+
+
diff --git a/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6536ecf3ccded53dea21f44d7f54d40f9405110d
--- /dev/null
+++ b/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.95
+ 100.64.35.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723240
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27590cb0-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62f9a648679de3393719f1f198475938e9b5809f
--- /dev/null
+++ b/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.200
+ 100.64.36.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704145131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27604f10-a8ee-11ee-8c6a-79d6a27183d0
+
+
+
diff --git a/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a40542fe6f9e2566a66a715cf3fed4513d7aa213
--- /dev/null
+++ b/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.239
+ 100.64.13.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27641c70-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98c740094973bc516cf55b129f730f09b16598b2
--- /dev/null
+++ b/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.44
+ 100.64.51.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 27697bd0-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c5d1fb00750a59fc529e4b94769bf9d67ccc9a1
--- /dev/null
+++ b/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.230
+ 100.64.86.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 276b1e40-2a82-11ed-8698-87f85c8d72c2
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 276b1e40-2a82-11ed-8698-87f85c8d72c2
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 276b1e40-2a82-11ed-8698-87f85c8d72c2
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 276b1e40-2a82-11ed-8698-87f85c8d72c2
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 276b1e40-2a82-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d51d584e4c3e530bac09a93e58d5714f42e35039
--- /dev/null
+++ b/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.200
+ 100.64.36.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704145131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 276f6a40-a8ee-11ee-8c6a-79d6a27183d0
+
+
+
diff --git a/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a60d2485b073cd42d8e1ee64fb9e022e1b72fa5d
--- /dev/null
+++ b/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.230
+ 100.64.86.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662097401
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27704e60-2a82-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml b/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d90efdf3e81faad3ef495244ef99305782db6fb
--- /dev/null
+++ b/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.163
+ 100.64.37.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.235
+ 100.64.24.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.37.164
+ 100.64.37.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+ INCIDENT_LINK
+ 1710812209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 277a5010-e591-11ee-a357-23176ea63506
+
+
+
diff --git a/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..343de9e35d6d27c026204faace947a8a169ff1e7
--- /dev/null
+++ b/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.120
+ 100.64.81.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687646014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27809810-12df-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687646014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27809810-12df-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..568bd51fa9a3edac66473c495d5ebbe1b8fc0197
--- /dev/null
+++ b/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.14
+ 100.64.74.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.16
+ USER-0015-1665.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397120
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2783b920-f6aa-11ec-86ed-01daccdabaa6
+
+
+
diff --git a/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2f425687b0f2b93f1d06c717603de200657d8e6
--- /dev/null
+++ b/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.195
+ USER-0015-2176.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.61.12
+ 100.64.61.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.196
+ 100.64.97.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.91
+ USER-0015-2177.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636877
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27950090-085a-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..142633d06e24a48f51396d3205e78a39798a49f7
--- /dev/null
+++ b/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.234
+ 100.64.49.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27a01400-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a890b212e90ff3312afafa3c724f40b1f9473991
--- /dev/null
+++ b/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.44
+ 100.64.80.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.45
+ 100.64.80.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687130618
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27ad61b0-0e2f-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130618
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27ad61b0-0e2f-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cc67545b3b2209dc95b2bd12fd5552727764c57
--- /dev/null
+++ b/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.136.204
+ 172.21.136.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.128
+ 100.64.88.128
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661968982
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27ae47a0-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661968982
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27ae47a0-2957-11ed-833a-955cfd42297d
+
+
+
diff --git a/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb4fc25b5ecffaadbdf4c38a0de8d0d604bf624b
--- /dev/null
+++ b/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.234
+ 100.64.49.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237833
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27b1ee50-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..869fb6004d41b0135a091509c3343a78de7effad
--- /dev/null
+++ b/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.150
+ 100.64.95.150
+ []
+ 0.25
+ ["Precinct","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1719581244
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 27b294a0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581244
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 27b294a0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de03e3d3bfd4708d366a59aa1cea5d8beae660d9
--- /dev/null
+++ b/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.37
+ USER-0015-1666.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.17
+ 100.64.74.17
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.18
+ 100.64.74.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27be0300-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27be0300-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27be0300-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27be0300-f6aa-11ec-86ed-01daccdabaa6
+
+
+
diff --git a/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07ddc8511922e8a75f7446e7d93b5a1f69b87426
--- /dev/null
+++ b/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c15e60-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c15e60-f6aa-11ec-86ed-01daccdabaa6
+
+
+
diff --git a/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..480bf4fa4ccd7b597da37ba4dd5906d8266b3366
--- /dev/null
+++ b/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.144
+ 100.64.51.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.145
+ 100.64.51.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.197
+ 100.64.29.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.146
+ 100.64.51.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529933
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27c94a20-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13b0e474d84911b0fe3bcb094568e6a66cf708ed
--- /dev/null
+++ b/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.116
+ 100.64.78.116
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658782975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d53750-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658782975
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d53750-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02ed6003e04fe043c2cceb133aad674280a5f4c4
--- /dev/null
+++ b/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml
@@ -0,0 +1,729 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.211.94
+ 172.21.211.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.1.77
+ 100.64.1.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.114
+ 100.64.90.114
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.77
+ 100.64.87.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.252
+ 100.64.86.252
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.3
+ 100.64.87.3
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.162.189
+ 172.18.162.189
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.115
+ 100.64.90.115
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.116
+ 100.64.90.116
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.117
+ 100.64.90.117
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.22.39
+ 172.26.22.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.118
+ 100.64.90.118
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.119
+ 100.64.90.119
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.67.109
+ 172.24.67.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.20.133.1
+ 172.20.133.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 172.29.225.232
+ 172.29.225.232
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447781
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27d7d060-c84f-11ed-9476-bf08a649e623
+
+
+
diff --git a/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41530f577005c30f6a05e4e0b64d44d10127ecf7
--- /dev/null
+++ b/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27d910d0-899a-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acc3eaf1e64bc2f6f1fb846341d05f2c0a35098f
--- /dev/null
+++ b/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.209
+ 100.64.50.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694194551
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27df2a90-4e6e-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be45cb2cd3bedb9e69e3f4482fce70a11fcdc200
--- /dev/null
+++ b/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699330473
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27e444f0-7d24-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45b6a1b131a33f858c4bb442863b27b7878fc5c7
--- /dev/null
+++ b/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.181
+ 100.64.62.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694013733
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 27e858a0-4cc9-11ee-ba64-e11deb1801e6
+
+
+
diff --git a/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14d5079944c60168c4540a55fbab0941f1b9e3b2
--- /dev/null
+++ b/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.236
+ 100.64.49.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698237834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 27eb74e0-7334-11ee-8dd4-3562adb8c958
+
+
+
diff --git a/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d7aa21cb177f3be2f0b910c8849e1d6d8c7db9a
--- /dev/null
+++ b/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.209
+ 100.64.50.209
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694194551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27f068a0-4e6e-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c85caaecfcb5bee65b7093f78cd57efa759ee98b
--- /dev/null
+++ b/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 27f105a0-899a-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6de55df30c83fae08e1b7a5b2a5abea8318ef8f1
--- /dev/null
+++ b/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml
@@ -0,0 +1,825 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.22
+ 100.64.36.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.23
+ 100.64.36.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.24
+ 100.64.36.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.25
+ 100.64.36.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.251
+ HOST-6674
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.26
+ 100.64.36.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.207
+ 100.64.10.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.27
+ 100.64.36.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.28
+ 100.64.36.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.29
+ 100.64.36.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.30
+ 100.64.36.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.210
+ 100.64.11.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.151
+ 100.64.22.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f40e70-5e4e-11ee-8592-6935d79f5b6b
+
+
+
diff --git a/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4a4a30bf6072f0c37eee1cb2ab12f1db2f4321d
--- /dev/null
+++ b/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.33
+ 100.64.39.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699330473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 27f50dd0-7d24-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41d6ec9a4189eab81c9fca7fac22facc784a1d49
--- /dev/null
+++ b/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.19
+ 100.64.74.19
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.20
+ 100.64.74.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.21
+ 100.64.74.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.22
+ 100.64.74.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+ INCIDENT_LINK
+ 1656397121
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f602f0-f6aa-11ec-86ed-01daccdabaa6
+
+
+
diff --git a/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..111fad5dcc7d3b8d0baaadf7a809b394fdd6c1d2
--- /dev/null
+++ b/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.100
+ 100.64.92.100
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714340955
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f8bf80-05a9-11ef-8a49-f14dcee941df
+
+
+ INCIDENT_LINK
+ 1714340955
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 27f8bf80-05a9-11ef-8a49-f14dcee941df
+
+
+
diff --git a/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3de32b6e53ebd4965142f5877ec7ab487d3f298c
--- /dev/null
+++ b/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 28013240-899a-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49debed82b8618ead4f5272944824b7956695a34
--- /dev/null
+++ b/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.103
+ 100.64.45.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 28019d20-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27813ce5bfa30288dd5619231062c490c7262e76
--- /dev/null
+++ b/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.33
+ 100.64.39.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699330473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 2805afa0-7d24-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0dfc2b237e89196ca501f0579f05e2874e5d872
--- /dev/null
+++ b/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml
@@ -0,0 +1,797 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.42
+ 100.64.36.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.43
+ 100.64.36.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.44
+ 100.64.36.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.239
+ 100.64.35.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.45
+ 100.64.36.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.46
+ 100.64.36.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.87
+ 100.64.23.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.196
+ 100.64.20.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.113
+ 100.64.22.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.47
+ 100.64.36.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.38
+ 100.64.10.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.48
+ 100.64.36.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.10
+ 100.64.6.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.49
+ 100.64.36.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.14
+ 100.64.5.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+ INCIDENT_LINK
+ 1695940026
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 2806d320-5e4e-11ee-8592-6935d79f5b6b
+
+
+
diff --git a/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfb674282bd0b5885f920650ca51421dce49a76d
--- /dev/null
+++ b/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 2814ba40-899a-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b689d602e67ebb868f9ce91263227976e27484e7
--- /dev/null
+++ b/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.103
+ 100.64.45.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690431301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 282048b0-2c34-11ee-9c67-95364ad06683
+
+
+
diff --git a/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82e67f4546d28be04f2a2c27a5332c84d3ea8cc5
--- /dev/null
+++ b/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 2821d9a0-899a-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c791821f2c372aa943d7dd2c1de326dd75798982
--- /dev/null
+++ b/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.117
+ 100.64.78.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658782976
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 28294ac0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658782976
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 28294ac0-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01198d4e11e9490353be14775a427cfd44f845e5
--- /dev/null
+++ b/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,517 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.156
+ 100.64.90.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.19.16
+ 100.64.19.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.157
+ 100.64.90.157
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.158
+ 100.64.90.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.159
+ 100.64.90.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.77
+ 100.64.22.77
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.160
+ 100.64.90.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.81
+ 100.64.7.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.161
+ 100.64.90.161
+ []
+ 0.4375
+ ["Precinct","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.162
+ 100.64.90.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.145
+ 100.64.37.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.163
+ 100.64.90.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.129
+ 100.64.63.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+ INCIDENT_LINK
+ 1703022428
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 282ad1d0-9eb8-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c35141b4a46d440c93fc07e672eba1c20f1032a4
--- /dev/null
+++ b/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700700568
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 28303180-899a-11ee-bba1-ef6459fc1a52
+
+
+