diff --git a/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc0440907400f992ba8332639b64f33463d7dfad --- /dev/null +++ b/graph/incidents_graphml/1/1d7dd0b0-67aa-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696969083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1d7dd0b0-67aa-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..710159c9b0dfdc2324a10f8d8699472439613deb --- /dev/null +++ b/graph/incidents_graphml/1/1d8138a0-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694812580 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d8138a0-540d-11ee-99ed-211c2b4ec819 + + + INCIDENT_LINK + 1694812580 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d8138a0-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b6ed9ef6ce5471e640361bad48be253459b91ff --- /dev/null +++ b/graph/incidents_graphml/1/1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.112 + 100.64.55.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871698 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d8a6040-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76bab08a71c93887f35437456f18d044f97ae808 --- /dev/null +++ b/graph/incidents_graphml/1/1d8c1110-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.7.217.207 + 10.7.217.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.171 + 100.64.80.171 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.172 + 100.64.80.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1d8c1110-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1d8c1110-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1d8c1110-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1d8c1110-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b6dd81d30768e94804fbb3edd796a21b16ae155 --- /dev/null +++ b/graph/incidents_graphml/1/1d8cc4d0-67aa-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696969083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d8cc4d0-67aa-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9ea861d64d0b10f60cd699c2f529945d47a1443 --- /dev/null +++ b/graph/incidents_graphml/1/1d93d640-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.11.133 + 100.64.11.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812580 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d93d640-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e83419e5f6414fc583d217e5fe9013bc5fdf4cb2 --- /dev/null +++ b/graph/incidents_graphml/1/1d9be000-67aa-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.15 + 100.64.53.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696969083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1d9be000-67aa-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70aeb75832a7917ab08b6559d057cef0a854f64f --- /dev/null +++ b/graph/incidents_graphml/1/1da00b20-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.102 + 100.64.55.102 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1da00b20-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..130161e158deb461b9c5f2433e517cc1ae154876 --- /dev/null +++ b/graph/incidents_graphml/1/1da5b740-5794-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.97 + 100.64.69.97 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695200415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1da5b740-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1da5b740-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1da5b740-5794-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1da5b740-5794-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5e0c602a59afe55e95752a28962d95607b8abd3 --- /dev/null +++ b/graph/incidents_graphml/1/1db36c10-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.102 + 100.64.55.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1db36c10-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4f3af841ff34d10baaf39d4538dd195a9f21336 --- /dev/null +++ b/graph/incidents_graphml/1/1dc2f140-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.253 + 100.64.55.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722053 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc2f140-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f19d41d86b7dfefbe6a20c3bffbeb4d007659022 --- /dev/null +++ b/graph/incidents_graphml/1/1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.102 + 100.64.55.102 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc371a0-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..174bdab1951d692f8ce182827903a373503c72a2 --- /dev/null +++ b/graph/incidents_graphml/1/1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.40 + 100.64.1.40 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.107 + 100.64.77.107 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664557971 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557971 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557971 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557971 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557971 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc420e0-40e3-11ed-ab2f-0f75c1e7adcb + + + diff --git a/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e11507af7bb1a4cdd188a8afbe05840a68d7d6a --- /dev/null +++ b/graph/incidents_graphml/1/1dc609e0-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.33 + USER-0015-1830.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.197 + 100.64.75.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675335 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc609e0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675335 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dc609e0-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b811bb234ae603ba5b85c5de65fc89190fcd0e10 --- /dev/null +++ b/graph/incidents_graphml/1/1dcd1ee0-5864-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.130 + 100.64.86.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695289751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1dcd1ee0-5864-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b2a644992b2ca9763f08c3d07377e07feb9e926 --- /dev/null +++ b/graph/incidents_graphml/1/1dce21a0-5c88-11ee-8e0e-93298c809ccb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.86 + 100.64.69.86 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695745018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dce21a0-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695745018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dce21a0-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695745018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dce21a0-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695745018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dce21a0-5c88-11ee-8e0e-93298c809ccb + + + diff --git a/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml b/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e43cda710531c78bb13872d3d19ad6e755dd3083 --- /dev/null +++ b/graph/incidents_graphml/1/1dcfe970-8ab6-11ee-b354-dddc00541db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.17 + 100.64.17.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700822528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1dcfe970-8ab6-11ee-b354-dddc00541db7 + + + diff --git a/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7988fab5e6722e8b0d399d7e55df265aa705a9e2 --- /dev/null +++ b/graph/incidents_graphml/1/1dd1f0b0-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.46.230 + 100.64.46.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812580 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1dd1f0b0-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1608d2490b63112d4cf56e8b1a434f5d0cacf8ec --- /dev/null +++ b/graph/incidents_graphml/1/1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.117.18656 + 192.168.117.18656 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Umbrella"] + + + HOST + 100.64.80.17 + 100.64.80.17 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686675335 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675335 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1dd7bd20-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84202de3bc8f94c134c0fe068d77a0ad19bf871d --- /dev/null +++ b/graph/incidents_graphml/1/1ddc3a10-5864-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.130 + 100.64.86.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695289751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ddc3a10-5864-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14b43a423c30d7c404e52d9e87279897a52d52d6 --- /dev/null +++ b/graph/incidents_graphml/1/1de1c3e0-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.253 + 100.64.55.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722054 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1de1c3e0-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml b/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ba602c90adedf274e39d2b70b033f03922ccf84 --- /dev/null +++ b/graph/incidents_graphml/1/1dff5420-128b-11ed-aa00-f95a069dbd3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.239 + USER-0015-1607.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659462423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1dff5420-128b-11ed-aa00-f95a069dbd3d + + + diff --git a/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9cbc9b5f4c6a704861b2ff3c4de89ab65d6e292 --- /dev/null +++ b/graph/incidents_graphml/1/1e116ab0-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.130 + 100.64.93.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812581 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e116ab0-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bddd9494702a77b4afbe7ebaee59902e973ebfc2 --- /dev/null +++ b/graph/incidents_graphml/1/1e292200-15ff-11ee-b6c1-6f3fa2e3bf20.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.105 + 100.64.69.105 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.248 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989596 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e292200-15ff-11ee-b6c1-6f3fa2e3bf20 + + + diff --git a/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9315d5345bc56f2fdf57c2fd420a2acd1c5bc731 --- /dev/null +++ b/graph/incidents_graphml/1/1e2a7910-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801116 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e2a7910-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c901ce6fe9fb5641709345efc482771fd16c6b4f --- /dev/null +++ b/graph/incidents_graphml/1/1e41d610-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.167 + 100.64.12.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266691 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1e41d610-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b7ff3a2e40e611e2c659dd722fea061ff053951 --- /dev/null +++ b/graph/incidents_graphml/1/1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.108 + 100.64.77.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664557972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e4a40d0-40e3-11ed-ab2f-0f75c1e7adcb + + + diff --git a/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71a20977bc35884d1f801ff32baffd61a183c190 --- /dev/null +++ b/graph/incidents_graphml/1/1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.184 + 100.64.76.184 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.109 + 100.64.77.109 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.110 + 100.64.77.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664557972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e4bee80-40e3-11ed-ab2f-0f75c1e7adcb + + + diff --git a/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..258938a9357e9cc07c407e1873efb46e2baf378d --- /dev/null +++ b/graph/incidents_graphml/1/1e59f1f0-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.167 + 100.64.12.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266691 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e59f1f0-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a76c56eafe64d25971b7cbf3ce6eda49f524ba69 --- /dev/null +++ b/graph/incidents_graphml/1/1e5c1c60-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e5c1c60-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58f471900e82dcadbecaeb5b3621aa398fc91904 --- /dev/null +++ b/graph/incidents_graphml/1/1e621420-0e2f-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.252 + 100.64.71.252 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687130603 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e621420-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130603 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e621420-0e2f-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b80df67868d3e7777a3b8185d8f94f0035b27689 --- /dev/null +++ b/graph/incidents_graphml/1/1e67ad90-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.169 + 100.64.12.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266691 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1e67ad90-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c19f93bbcdf906acdd92778999d6a83aaf0b9f1 --- /dev/null +++ b/graph/incidents_graphml/1/1e694920-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.21.26.128 + 10.21.26.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.129 + 100.64.78.129 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e694920-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e694920-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8edba7107f1e51c5bda0cf7b3bff60c7aaf29c5c --- /dev/null +++ b/graph/incidents_graphml/1/1e6caa10-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.132 + 100.64.93.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1694812581 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e6caa10-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2587ac48c9cb76bd8e904895a1740c0d52850d92 --- /dev/null +++ b/graph/incidents_graphml/1/1e6d2090-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.142 + 100.64.17.142 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923821 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e6d2090-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ddbc50f703b48bbdd6b8f1b7011d46c64a79648 --- /dev/null +++ b/graph/incidents_graphml/1/1e773df0-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.169 + 100.64.12.169 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266691 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e773df0-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7b971cf9bc2988540c6638cab46ecb94a48350b --- /dev/null +++ b/graph/incidents_graphml/1/1e7a8cc0-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.132 + 100.64.93.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812581 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e7a8cc0-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..468f32188eaff90b40364076960e129f6462147f --- /dev/null +++ b/graph/incidents_graphml/1/1e7b91a0-e69e-11ee-8f7e-8d09b3cead02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.195 + 100.64.56.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710927728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e7b91a0-e69e-11ee-8f7e-8d09b3cead02 + + + diff --git a/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54171907f55d6a4c0fb4cd6160cae7fa9a53776a --- /dev/null +++ b/graph/incidents_graphml/1/1e7c28a0-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.79.235 + 100.64.79.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.28.143 + 100.64.28.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680580 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e7c28a0-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3516002bbecf374f647ab678c3b460e18cd488b4 --- /dev/null +++ b/graph/incidents_graphml/1/1e858280-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.68 + 100.64.9.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1e858280-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39946948a356e15f76bd43a725861af986036b87 --- /dev/null +++ b/graph/incidents_graphml/1/1e8f9b60-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.46.230 + 100.64.46.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812582 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1e8f9b60-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cff1b5a0b708f632a88c871fd0a2e5c613df482 --- /dev/null +++ b/graph/incidents_graphml/1/1e95c5d0-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1e95c5d0-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8a058dffa8d5d05b5f575e046b40a5ef3629d24 --- /dev/null +++ b/graph/incidents_graphml/1/1ea4e100-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.56 + 100.64.13.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1ea4e100-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee5b019330d8a5c54aeed3757611561de40e3a72 --- /dev/null +++ b/graph/incidents_graphml/1/1ea873d0-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.68 + 100.64.9.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ea873d0-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a2d036125ee4931eaa72d1ac23a85c6c9decce4 --- /dev/null +++ b/graph/incidents_graphml/1/1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.114 + 100.64.55.114 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1eab60a0-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6862f0c752c370b2d46b753b5e42a8ed60ddc52 --- /dev/null +++ b/graph/incidents_graphml/1/1eb29ca0-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.56 + 100.64.13.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874235 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1eb29ca0-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..343bd082d4d3bedae5556548cddca012cfafe62c --- /dev/null +++ b/graph/incidents_graphml/1/1ebafc50-3937-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.60 + 100.64.41.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.61 + 100.64.41.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009437 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ebafc50-3937-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e35c991c5b128ab2e3ad54ab8ed9bf9fa070f748 --- /dev/null +++ b/graph/incidents_graphml/1/1ec94240-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.70 + 100.64.9.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ec94240-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf0dbe5cf047202b15887b23c2c749ba83594432 --- /dev/null +++ b/graph/incidents_graphml/1/1eca8180-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.134 + 100.64.93.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694812582 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1eca8180-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1285bda18fed2fd9d800f81aeba598598653b226 --- /dev/null +++ b/graph/incidents_graphml/1/1ed1c190-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.57 + 100.64.16.57 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301973 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1ed1c190-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc46eaf1a4998e0395918aa7df27f8a11c3f5758 --- /dev/null +++ b/graph/incidents_graphml/1/1ed975a0-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.134 + 100.64.93.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694812582 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ed975a0-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e89448ddc55248289e67bdabb514a393c8b74c39 --- /dev/null +++ b/graph/incidents_graphml/1/1ee61910-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.70 + 100.64.9.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1ee61910-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2c696d227f4f6e2da7bdaf359cb3461f6dc1517 --- /dev/null +++ b/graph/incidents_graphml/1/1ee9b950-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.248 + 100.64.8.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ee9b950-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76304fb15f46ab3e572fd7fd0fecd6580f7965f0 --- /dev/null +++ b/graph/incidents_graphml/1/1eeab5a0-1329-11ef-aba1-33e212db0be8.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.154 + 100.64.55.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.155 + 100.64.55.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.86 + 100.64.2.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.180 + 100.64.51.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.224 + 100.64.13.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1eeab5a0-1329-11ef-aba1-33e212db0be8 + + + diff --git a/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c14c6f8975c2c6683908d5b310ad579206c62d8 --- /dev/null +++ b/graph/incidents_graphml/1/1ef15780-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.57 + 100.64.16.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301973 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ef15780-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..082c7d864ad35a64f823c5156233882a9c6a1612 --- /dev/null +++ b/graph/incidents_graphml/1/1ef94b30-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.148 + USER-0015-1461.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425370 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1ef94b30-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4e4cd574ed3ef5c0f8c8e815cf4bcfd532c0eeb --- /dev/null +++ b/graph/incidents_graphml/1/1efb4580-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.250 + 100.64.8.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1efb4580-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..719e3520cceeeee61d1284d8851248cb0508de1a --- /dev/null +++ b/graph/incidents_graphml/1/1f00d2a0-29ae-11ee-9959-8506340212c8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690153831 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f00d2a0-29ae-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690153831 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f00d2a0-29ae-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml b/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..398189de7196640e45339b9b3f33ac24b8527073 --- /dev/null +++ b/graph/incidents_graphml/1/1f01adb0-af33-11ed-996b-a522ebb85241.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.224.96 + 192.168.224.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.21 + 100.64.85.21 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676686961 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f01adb0-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676686961 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f01adb0-af33-11ed-996b-a522ebb85241 + + + diff --git a/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..607fb52477e3310e497e20a58d006dd81b660115 --- /dev/null +++ b/graph/incidents_graphml/1/1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.250 + 100.64.8.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f11b3b0-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a42fa6e384cad6dc619c631aec9512706cb05707 --- /dev/null +++ b/graph/incidents_graphml/1/1f1fe600-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.148 + USER-0015-1461.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425370 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f1fe600-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e037cd46273e03dfd0542766b2b2c878fe36a45 --- /dev/null +++ b/graph/incidents_graphml/1/1f2ed1c0-5864-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.2 + USER-0015-1983.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695289753 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f2ed1c0-5864-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95748070ce09ea02745f1c723ae1af84afa34897 --- /dev/null +++ b/graph/incidents_graphml/1/1f38a050-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.115 + 100.64.78.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658782961 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f38a050-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782961 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f38a050-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c2361322a2242be253090ab3ecfbe425d65bdc5 --- /dev/null +++ b/graph/incidents_graphml/1/1f3ea160-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.123 + 100.64.47.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923822 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f3ea160-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acc350867cd1080ef468c52d4e93b036cf9c8f0b --- /dev/null +++ b/graph/incidents_graphml/1/1f443a10-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.255 + 100.64.55.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f443a10-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml new file mode 100644 index 0000000000000000000000000000000000000000..736c3b6afa29d92ae28f60aa2c25d8e8eecea016 --- /dev/null +++ b/graph/incidents_graphml/1/1f4e4760-f767-11ee-a32a-474576cc2660.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.128 + 100.64.70.128 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712773277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f4e4760-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f4e4760-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f4e4760-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f4e4760-f767-11ee-a32a-474576cc2660 + + + diff --git a/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..029202370cb05068463482bead41f3eea42b02d3 --- /dev/null +++ b/graph/incidents_graphml/1/1f519850-1f06-11ee-984e-6dd184c65476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688982165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f519850-1f06-11ee-984e-6dd184c65476 + + + diff --git a/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8db3148755faec14c17c84e4830ae1ca5f8df226 --- /dev/null +++ b/graph/incidents_graphml/1/1f51c700-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.228 + 100.64.7.228 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301974 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f51c700-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fd478e7d80f610649d5a65bb6c7e23b193f6c3d --- /dev/null +++ b/graph/incidents_graphml/1/1f5af2a0-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.51 + 100.64.27.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516209 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f5af2a0-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdc1943049f9f8ebaec745c92e40c5e45532e687 --- /dev/null +++ b/graph/incidents_graphml/1/1f673e30-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.20 + 100.64.31.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f673e30-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55726c468f9962add5fa4e57802f1deb885c7d0b --- /dev/null +++ b/graph/incidents_graphml/1/1f6b61e0-1f06-11ee-984e-6dd184c65476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688982165 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f6b61e0-1f06-11ee-984e-6dd184c65476 + + + diff --git a/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a12b8b9da9f6da1688a8944c299d83f11177a38 --- /dev/null +++ b/graph/incidents_graphml/1/1f708090-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.2 + 100.64.51.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.78.157 + 100.64.78.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688041138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f708090-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f708090-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c0bce2c2b4a64b050b3225fab584735c7e23445 --- /dev/null +++ b/graph/incidents_graphml/1/1f733590-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.51 + 100.64.27.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f733590-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85b674de1f00cf29130ff52d2240a89589aec0e7 --- /dev/null +++ b/graph/incidents_graphml/1/1f760b40-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.20 + 100.64.31.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642932 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f760b40-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e55fc911f2bf3452fcee557881f2a0808684879f --- /dev/null +++ b/graph/incidents_graphml/1/1f78aff0-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.237 + 100.64.28.237 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f78aff0-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d89e7ee791228d1e62f5c11b6ea753ebfe46b49 --- /dev/null +++ b/graph/incidents_graphml/1/1f802270-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.171 + 100.64.12.171 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1f802270-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ced670c066199754d36f7d66a180bedbf85684cc --- /dev/null +++ b/graph/incidents_graphml/1/1f807b10-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 192.0.2.182 + 192.0.2.182 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1f807b10-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e392684f47769ddc2e3b8320e9f00642d23d926e --- /dev/null +++ b/graph/incidents_graphml/1/1f8250c0-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.53 + 100.64.27.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1f8250c0-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08632351f92f14d107c1175fe68e0615e1eb8cfc --- /dev/null +++ b/graph/incidents_graphml/1/1f8621e0-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.122 + 100.64.28.122 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425371 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1f8621e0-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e779f3f38ab1006a6962b4d143555cb6da336ce --- /dev/null +++ b/graph/incidents_graphml/1/1f880d40-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.130 + 100.64.19.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801118 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1f880d40-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d38eafd2bb7e5cf38d37724e6b559e37ae090ab --- /dev/null +++ b/graph/incidents_graphml/1/1f8aef70-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.235 + 100.64.80.235 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.65.32 + 100.64.65.32 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f8aef70-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f8aef70-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f8aef70-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f8aef70-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fa879d2d4a50bd14277db0f984e36c04c34ed12 --- /dev/null +++ b/graph/incidents_graphml/1/1f8ef560-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.195 + 100.64.58.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1f8ef560-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ffc2e472874881969a8691a2e7ba403c2ab16c7 --- /dev/null +++ b/graph/incidents_graphml/1/1f907620-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.171 + 100.64.12.171 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f907620-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8f9357a956c726e9556c1f34bbc0cd2e63ee561 --- /dev/null +++ b/graph/incidents_graphml/1/1f978670-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.53 + 100.64.27.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f978670-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bf2e6bee49f477d1db08b67e9587b22ddf32f69 --- /dev/null +++ b/graph/incidents_graphml/1/1f997e60-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.237 + 100.64.28.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301974 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f997e60-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc875c01a8d66175b44ba67fff02250001822c00 --- /dev/null +++ b/graph/incidents_graphml/1/1f9ef510-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.173 + 100.64.12.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1f9ef510-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b7abb61512ccadefd75d624306810105fd2b2ff --- /dev/null +++ b/graph/incidents_graphml/1/1fa61890-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.88 + 100.64.55.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.115 + 100.64.81.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fa61890-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc026b3289bfe73504718ceecbcd4d07c6eecf04 --- /dev/null +++ b/graph/incidents_graphml/1/1fafe500-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1fafe500-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1560cde70fc2289c207e7a812798b0282bd130a --- /dev/null +++ b/graph/incidents_graphml/1/1fb19eb0-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.122 + 100.64.28.122 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425371 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1fb19eb0-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d1666205ff963597240e5014246415e0e422388 --- /dev/null +++ b/graph/incidents_graphml/1/1fb284e0-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.253 + 100.64.20.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145118 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fb284e0-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..447a7af33901037668b933cbcb6ef3de1b2dccca --- /dev/null +++ b/graph/incidents_graphml/1/1fb54210-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.195 + 100.64.58.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1fb54210-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbcefc1a31f9e97ae4fd3979ae936952a9665dff --- /dev/null +++ b/graph/incidents_graphml/1/1fbe1120-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,824 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.140 + USER-0015-2028.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.141 + 100.64.89.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.142 + 100.64.89.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.136 + 100.64.89.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.10.145 + 100.64.10.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.99 + 100.64.18.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.137 + 100.64.89.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.143 + 100.64.89.143 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.144 + 100.64.89.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.145 + USER-0015-2029.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.121 + 100.64.43.121 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.146 + 100.64.89.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.147 + 100.64.89.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.89.148 + 100.64.89.148 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.149 + 100.64.89.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 1fbe1120-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a79d2cfa6aae63442bde2ff7b91e69dcc67f6f8 --- /dev/null +++ b/graph/incidents_graphml/1/1fbfea90-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1fbfea90-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95739c678f5c9ce145c8c7f478feaed138b09615 --- /dev/null +++ b/graph/incidents_graphml/1/1fceb7a0-4f16-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.177 + 100.64.12.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694266693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1fceb7a0-4f16-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfee0fe7845e65e858361162a6a395c72e87b7f7 --- /dev/null +++ b/graph/incidents_graphml/1/1fd49000-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.217 + 100.64.35.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425372 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1fd49000-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2554dac4bf7b534335c8025064f4e9152c06a099 --- /dev/null +++ b/graph/incidents_graphml/1/1fd6fef0-3e55-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.130 + 100.64.69.130 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.131 + 100.64.69.131 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692424582 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd6fef0-3e55-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82fcb2cd8615a1bab5340be747600a175b581315 --- /dev/null +++ b/graph/incidents_graphml/1/1fd944d0-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.157 + 100.64.42.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fd944d0-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d070139066174bf4483ce562ae6aa4fd8b37425a --- /dev/null +++ b/graph/incidents_graphml/1/1fdaaae0-2825-11ef-b581-4d62d2263ef1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.28.205.172 + 172.28.205.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.92.73 + 100.64.92.73 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718132538 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fdaaae0-2825-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132538 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fdaaae0-2825-11ef-b581-4d62d2263ef1 + + + diff --git a/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..260a7257aa1d59737cf203b4d1a300735f76d2e9 --- /dev/null +++ b/graph/incidents_graphml/1/1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.252 + 100.64.8.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1fdc7dc0-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..751ed4b726348463e4cf5421b2fcd903201e2c33 --- /dev/null +++ b/graph/incidents_graphml/1/1fe3da00-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.72 + 100.64.9.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1fe3da00-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfb0b1bf68162b39f32169ddb13fc7e463518800 --- /dev/null +++ b/graph/incidents_graphml/1/1ff07af0-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.252 + 100.64.8.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336480 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ff07af0-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..530cce4ae1fb66751b35ff544a4bef0706c1c5a2 --- /dev/null +++ b/graph/incidents_graphml/1/1ffa8870-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.157 + 100.64.42.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1ffa8870-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..338aafd77e675b6e4171b010ab7b0dd04dea0980 --- /dev/null +++ b/graph/incidents_graphml/2/20011e40-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.217 + 100.64.35.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20011e40-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02fafa1bd2b947e1b8f72e9b03fd3b36bc971a48 --- /dev/null +++ b/graph/incidents_graphml/2/200329e0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 200329e0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e60d2f05573fbf5461ca08ef35d96ebb3b8b5e82 --- /dev/null +++ b/graph/incidents_graphml/2/2013b5c0-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.196 + 100.64.58.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2013b5c0-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd9fbc5272c4780b34d132f779730f0cf122c6d0 --- /dev/null +++ b/graph/incidents_graphml/2/201615a0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923824 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 201615a0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d188c15a1b23ae790aa618529bb7ac59bb9cb88 --- /dev/null +++ b/graph/incidents_graphml/2/20185780-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.72 + 100.64.9.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287705 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20185780-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5a69a2b0ef0f7fcb357e7111838886e2091ab53 --- /dev/null +++ b/graph/incidents_graphml/2/2018aa50-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.146 + 100.64.17.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723228 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2018aa50-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..894f0b73c26efd46040bbb32fdfc641f80f7e7ce --- /dev/null +++ b/graph/incidents_graphml/2/202061a0-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.60 + HOST-6694 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 202061a0-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c7e28e5d524af7d3d3973784fd1926675b91816 --- /dev/null +++ b/graph/incidents_graphml/2/202288f0-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.155 + 100.64.57.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746871 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 202288f0-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db16de6d057f843c2b75f298accd68e22b77171a --- /dev/null +++ b/graph/incidents_graphml/2/20228cd0-8a86-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.110 + USER-0015-1308.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700801916 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20228cd0-8a86-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1f0d0123f2a3f576d5b392dd5b5af23d911e61e --- /dev/null +++ b/graph/incidents_graphml/2/20348e30-8a86-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.110 + USER-0015-1308.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700801916 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20348e30-8a86-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b8eb5b36d9897e1b371bca12659fc371f9a3eb5 --- /dev/null +++ b/graph/incidents_graphml/2/203e3da0-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.136.204 + 172.21.136.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.88.133 + 100.64.88.133 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500700 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 203e3da0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500700 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 203e3da0-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6d6303b76d0103f2cf98ed40b1fc5732fdfd55d --- /dev/null +++ b/graph/incidents_graphml/2/2041d4a0-8a86-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700801916 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2041d4a0-8a86-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8df97809e79d2b13c3e446723c8429a038b23d8c --- /dev/null +++ b/graph/incidents_graphml/2/204996d0-10b6-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.64 + 100.64.68.64 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1687408490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 204996d0-10b6-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42f31643396bd4d88753e970887c94b89f4f4eb9 --- /dev/null +++ b/graph/incidents_graphml/2/20500570-8a86-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700801916 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20500570-8a86-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55d94e3be5073e2c0af54e1795bcdcf930611d03 --- /dev/null +++ b/graph/incidents_graphml/2/20682570-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.247 + 100.64.64.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20682570-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml b/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9224ca9e9329323f9e41564ede36b794b3068a20 --- /dev/null +++ b/graph/incidents_graphml/2/2080e440-2628-11ef-a119-11a748dd97ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.158 + 100.64.19.158 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717913925 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2080e440-2628-11ef-a119-11a748dd97ab + + + diff --git a/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ae54c9b9018fb38576ee43a1cb7ce015dca6f73 --- /dev/null +++ b/graph/incidents_graphml/2/20810c70-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.125 + 100.64.47.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20810c70-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa1f6d41a0fb08bba2ee176b3ec59c9b6092abf8 --- /dev/null +++ b/graph/incidents_graphml/2/20845390-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.62 + 100.64.36.62 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20845390-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2320ec9a3be70ab9a321af5846bc448168088dae --- /dev/null +++ b/graph/incidents_graphml/2/20860db0-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20860db0-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5ce65ae832e43acc6d73a89538ba0441c7c168a --- /dev/null +++ b/graph/incidents_graphml/2/20880180-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20880180-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml b/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2960a2c4b704290df842d449e0052ceddd98b4b7 --- /dev/null +++ b/graph/incidents_graphml/2/208e78d0-2628-11ef-a119-11a748dd97ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.160 + 100.64.19.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717913925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 208e78d0-2628-11ef-a119-11a748dd97ab + + + diff --git a/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b940a0646ffb9b8b2cd46fe5c52aa6106a038f6a --- /dev/null +++ b/graph/incidents_graphml/2/208ffef0-a390-11ee-8ba4-254a3074c3aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.143 + 100.64.32.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 208ffef0-a390-11ee-8ba4-254a3074c3aa + + + diff --git a/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54011331f9f73c49afb54b7513bd3529896f9ce2 --- /dev/null +++ b/graph/incidents_graphml/2/20935bf0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.125 + 100.64.47.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923825 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20935bf0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f0444b75395989e2ac1a2767a57dd28dbd150fd --- /dev/null +++ b/graph/incidents_graphml/2/2093af20-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2093af20-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..123b9026b6f5bfbfe3befc03c0be9818a9f2d150 --- /dev/null +++ b/graph/incidents_graphml/2/209464d0-5c4c-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.41 + 100.64.17.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695719252 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 209464d0-5c4c-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9689ea1939c0058bc79098555136d0f275d37bc7 --- /dev/null +++ b/graph/incidents_graphml/2/209995b0-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 209995b0-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23232855df92cfe45a366eb14cbb2f18584e6375 --- /dev/null +++ b/graph/incidents_graphml/2/209b3b60-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 209b3b60-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aacafeed7a67d58dc5a97ad4d17e1d33eefcbee8 --- /dev/null +++ b/graph/incidents_graphml/2/209fb1c0-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.170.40 + 192.168.170.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.83.52 + 100.64.83.52 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.83.53 + 100.64.83.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 209fb1c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 209fb1c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 209fb1c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 209fb1c0-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c94b2a895556ce32643f848309badf9b008ce09 --- /dev/null +++ b/graph/incidents_graphml/2/20a1eba0-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.115 + 100.64.66.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728812 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20a1eba0-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0323953115a44aeff501506497459fe7a3287d26 --- /dev/null +++ b/graph/incidents_graphml/2/20a7ed90-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20a7ed90-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d6f23f777095b12102b19a7fb708c5832cd2fa6 --- /dev/null +++ b/graph/incidents_graphml/2/20a80ca0-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.157 + 100.64.57.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20a80ca0-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb129a41e51b20002644d41ffce5db4435211a90 --- /dev/null +++ b/graph/incidents_graphml/2/20b15ea0-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.223 + 100.64.47.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722058 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20b15ea0-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c15457068c6e23c93ea83509536121cc326a0a2c --- /dev/null +++ b/graph/incidents_graphml/2/20b1ca20-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.115 + 100.64.66.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728813 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20b1ca20-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9754a7464f0848cb9a28683b309772b466feb88 --- /dev/null +++ b/graph/incidents_graphml/2/20b63d70-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.157 + 100.64.57.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20b63d70-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b0e7290f6f1a711202b3231933ab31863ea5877 --- /dev/null +++ b/graph/incidents_graphml/2/20b69390-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20b69390-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b70aed2119090582e483df0dd485c15cc9779cf --- /dev/null +++ b/graph/incidents_graphml/2/20b6c780-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.121 + 100.64.66.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20b6c780-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml b/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17ab814765b2d529c7eb5a6ed9df54e84836bd50 --- /dev/null +++ b/graph/incidents_graphml/2/20b9a550-960e-11ee-9038-c9d706efb14e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.138 + 100.64.30.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702069791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20b9a550-960e-11ee-9038-c9d706efb14e + + + diff --git a/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a4008055dfad859d37d0b33793cf1c9b73a163b --- /dev/null +++ b/graph/incidents_graphml/2/20bb6920-0fbe-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.62 + 100.64.36.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687301976 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20bb6920-0fbe-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dd809abe41921c344deae666711b50d627d314f --- /dev/null +++ b/graph/incidents_graphml/2/20bba8a0-e2a3-11ee-8bca-5190faa7db82.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.134 + 100.64.22.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.241 + 100.64.68.241 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.146 + 100.64.17.146 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.242 + 100.64.68.242 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490075 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20bba8a0-e2a3-11ee-8bca-5190faa7db82 + + + diff --git a/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27da8731c156e89f54406c1b98df63a5e327ceb0 --- /dev/null +++ b/graph/incidents_graphml/2/20bf9a70-a390-11ee-8ba4-254a3074c3aa.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.224 + 100.64.69.224 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20bf9a70-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20bf9a70-a390-11ee-8ba4-254a3074c3aa + + + diff --git a/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f45653ac41d99d82912e3fe75e87e479cd060398 --- /dev/null +++ b/graph/incidents_graphml/2/20c1e130-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842387 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20c1e130-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml b/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4a151eab16f1bae501b928bd1c1e048ce6a9b1f --- /dev/null +++ b/graph/incidents_graphml/2/20c2e090-7b95-11ee-9581-a3221813a5fb.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.250 + 100.64.26.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.108 + 100.64.48.108 + [] + 0.25 + ["Precinct"] + + + HOST + 100.64.48.109 + 100.64.48.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.60 + 100.64.9.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.110 + 100.64.48.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c2e090-7b95-11ee-9581-a3221813a5fb + + + diff --git a/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ffde7d1b19d793e640e81a4f560a5d83fb62a8f --- /dev/null +++ b/graph/incidents_graphml/2/20c42020-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.158 + 100.64.57.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c42020-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml b/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c385802010538e645ba6c2e879fa8b961ef481f2 --- /dev/null +++ b/graph/incidents_graphml/2/20c62870-960e-11ee-9038-c9d706efb14e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.138 + 100.64.30.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702069791 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20c62870-960e-11ee-9038-c9d706efb14e + + + diff --git a/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e61d9aec459bf7f662e9cfcb5d62170dc42e2422 --- /dev/null +++ b/graph/incidents_graphml/2/20c6e740-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.31 + 100.64.61.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c6e740-558d-11ee-a21e-c5479afee9bb + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c6e740-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdd866eb7b147b4fe153e42741ec9f59cf543ab4 --- /dev/null +++ b/graph/incidents_graphml/2/20c8a1d0-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.121 + 100.64.66.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20c8a1d0-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fec14b53d629cfffd50c0a55c2a0177e49557444 --- /dev/null +++ b/graph/incidents_graphml/2/20c927b0-f36e-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.254 + 100.64.8.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712336481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20c927b0-f36e-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f114a48d99bc727a3b0b7572ba68b98cc95b8e5 --- /dev/null +++ b/graph/incidents_graphml/2/20ccdc40-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.54 + 100.64.83.54 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.52.131 + 100.64.52.131 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ccdc40-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ccdc40-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ccdc40-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ccdc40-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a052747c89910d811edba48087e03f1c8f4fe6e --- /dev/null +++ b/graph/incidents_graphml/2/20d068a0-675e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.81 + 100.64.8.81 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.31 + 100.64.12.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.32 + 100.64.12.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.34 + 100.64.12.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.35 + 100.64.12.35 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.36 + 100.64.12.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.37 + 100.64.12.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.38 + 100.64.12.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d068a0-675e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec49907fc2a4ddcc2a938ef55eb5ba412a559053 --- /dev/null +++ b/graph/incidents_graphml/2/20d27800-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.158 + 100.64.57.158 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20d27800-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5174e3dfffd65306f4d3b980481fb855a6064660 --- /dev/null +++ b/graph/incidents_graphml/2/20d3df90-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.31 + 100.64.61.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d3df90-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d26097d81cc3c4e4ff07613aab2c872b5a614e41 --- /dev/null +++ b/graph/incidents_graphml/2/20d4d890-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.132 + 100.64.19.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801121 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20d4d890-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59433b481445df1a5edd0b23ea2983d46f11907c --- /dev/null +++ b/graph/incidents_graphml/2/20d67dd0-a390-11ee-8ba4-254a3074c3aa.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.200 + 100.64.27.200 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.29.132 + 100.64.29.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.225 + 100.64.69.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.21 + 100.64.68.21 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.26.143 + 100.64.26.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.33.184 + 100.64.33.184 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.226 + 100.64.69.226 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.49.104 + 100.64.49.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.46.234 + 100.64.46.234 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.227 + 100.64.69.227 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.228 + 100.64.69.228 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.177 + 100.64.29.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d67dd0-a390-11ee-8ba4-254a3074c3aa + + + diff --git a/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19833bb5ede725d03ef5be9602f2770106a53e7e --- /dev/null +++ b/graph/incidents_graphml/2/20d9b220-a390-11ee-8ba4-254a3074c3aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.27.200 + 100.64.27.200 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20d9b220-a390-11ee-8ba4-254a3074c3aa + + + diff --git a/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90bd1f1eee99cf3d0d4693398b246d2b2c6913c1 --- /dev/null +++ b/graph/incidents_graphml/2/20df27a0-13a2-11ef-ad44-1f39f7953267.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.53 + 100.64.86.53 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1715877252 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df27a0-13a2-11ef-ad44-1f39f7953267 + + + diff --git a/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..285f6616ead2149f2a59b19c02a6db0d389e4b95 --- /dev/null +++ b/graph/incidents_graphml/2/20df83d0-675e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,839 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.48 + 100.64.12.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.49 + 100.64.12.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.50 + 100.64.12.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.51 + 100.64.12.51 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.52 + 100.64.12.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.53 + 100.64.12.53 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.54 + 100.64.12.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.55 + 100.64.12.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.85 + 100.64.3.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.56 + 100.64.12.56 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.57 + 100.64.12.57 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.58 + 100.64.12.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.60 + 100.64.12.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936447 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20df83d0-675e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d687f79c747735bdbbfcc1e90679768fc5390b15 --- /dev/null +++ b/graph/incidents_graphml/2/20dfa280-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.79 + 100.64.46.79 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20dfa280-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fdeec9e8ab814f0d452933b05de154264cff46c --- /dev/null +++ b/graph/incidents_graphml/2/20e062b0-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.226 + 100.64.48.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20e062b0-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4254da002a0b40c6a32b2d7f34b43a3dcf52b1b3 --- /dev/null +++ b/graph/incidents_graphml/2/20e081c0-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20e081c0-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c137206ea9ccb31cb6f52a5d9d9f5b8b026c607f --- /dev/null +++ b/graph/incidents_graphml/2/20e5ef90-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.132 + 100.64.19.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801121 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 20e5ef90-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5871179349c2050b8b05311c5845a9522b03df44 --- /dev/null +++ b/graph/incidents_graphml/2/20e740e0-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.1 + 100.64.55.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041680 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20e740e0-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a00bba5c0a50d29b7ef70415c2a62909b66b068 --- /dev/null +++ b/graph/incidents_graphml/2/20ea3520-6590-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.125 + USER-0015-1291.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.155 + 100.64.28.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.49 + 100.64.32.49 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.166 + 100.64.10.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.50 + 100.64.32.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738019 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 20ea3520-6590-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3218f600d7afe900bbe4d6cc65024ec4b2800f5 --- /dev/null +++ b/graph/incidents_graphml/2/20ec8260-ea53-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.238 + 100.64.68.238 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1711335325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ec8260-ea53-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711335325 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ec8260-ea53-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..049317f1c34fa247a425efbb542910650088925a --- /dev/null +++ b/graph/incidents_graphml/2/20edf740-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.226 + 100.64.48.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20edf740-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..caa76fcfd004240e97d8738af59e3a8ae874f183 --- /dev/null +++ b/graph/incidents_graphml/2/20f29bf0-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.165 + 100.64.26.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792739 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20f29bf0-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d72ab59f035b276f44a6a1c8234c1d2b004206f8 --- /dev/null +++ b/graph/incidents_graphml/2/20f457e0-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746873 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 20f457e0-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24b12225d1d4933e4e57f8466a9145ed8f0bfb54 --- /dev/null +++ b/graph/incidents_graphml/2/20f57ff0-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801121 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20f57ff0-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml b/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7707615ab213afc54be42b1f33b0faf8e525a37d --- /dev/null +++ b/graph/incidents_graphml/2/20ff6290-a390-11ee-8ba4-254a3074c3aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.82 + 100.64.13.82 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1703554991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 20ff6290-a390-11ee-8ba4-254a3074c3aa + + + diff --git a/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98704ba1ad93566e040cb1bc663e037c62c4b6eb --- /dev/null +++ b/graph/incidents_graphml/2/210049e0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.23 + 100.64.12.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473477 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 210049e0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45c92af8cbd17a95a764ac97604af69fe4af0889 --- /dev/null +++ b/graph/incidents_graphml/2/2103d7d0-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801121 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2103d7d0-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac4f7be92ae3d4eaad713710df86891dea310c20 --- /dev/null +++ b/graph/incidents_graphml/2/2107e720-7c09-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.137 + 100.64.38.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.138 + 100.64.38.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.139 + 100.64.38.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.140 + 100.64.38.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.180 + USER-0015-1207.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2107e720-7c09-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de445e0e70db8273c09424e600066716ba013189 --- /dev/null +++ b/graph/incidents_graphml/2/210de1e0-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.19 + 100.64.80.19 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.139 + 100.64.71.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 210de1e0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675341 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 210de1e0-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml b/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2beffafaa72845d8fb0d61bae40f57ec8cfe1e44 --- /dev/null +++ b/graph/incidents_graphml/2/210f13d0-558d-11ee-a21e-c5479afee9bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.118 + 100.64.15.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694977512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 210f13d0-558d-11ee-a21e-c5479afee9bb + + + diff --git a/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31f70314f4ceb406d1aa111413ab3b38f0aa1b3f --- /dev/null +++ b/graph/incidents_graphml/2/21106b60-5374-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.161 + 100.64.57.161 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694746873 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21106b60-5374-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..123c05e84db39cdba4afc69e2c3eacd1e5e9bf5d --- /dev/null +++ b/graph/incidents_graphml/2/211228e0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.104 + 100.64.3.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.127 + USER-0015-1367.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.128 + 100.64.47.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.38 + 100.64.10.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.86 + 100.64.33.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.115 + 100.64.39.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.35 + 100.64.43.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.129 + 100.64.47.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.235 + 100.64.28.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.255 + 100.64.26.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.140 + 100.64.38.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694923825 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 211228e0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43a30fecf604cd45fb68f5b880fe1381020b5d47 --- /dev/null +++ b/graph/incidents_graphml/2/2117c5a0-7c09-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.137 + 100.64.38.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699208914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2117c5a0-7c09-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..260270057a7cbc9f6189f86e59527d3d9b7c1801 --- /dev/null +++ b/graph/incidents_graphml/2/212443b0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.192 + 100.64.76.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.125 + 100.64.71.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658782964 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 212443b0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782964 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 212443b0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74d58b0bb65e75fddc49b41565d7f97b119adf16 --- /dev/null +++ b/graph/incidents_graphml/2/212732d0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.23 + 100.64.12.23 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 212732d0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml b/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bca6a35c5644244774fc8ec9b1cdd05b4d10457c --- /dev/null +++ b/graph/incidents_graphml/2/21472bc0-7b95-11ee-9581-a3221813a5fb.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.190 + 100.64.32.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.114 + 100.64.48.114 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.115 + 100.64.48.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.103 + 100.64.43.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.41 + 100.64.23.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.116 + 100.64.48.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.64 + USER-0015-1247.example.internal + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.34 + 100.64.37.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.157 + USER-0015-1377.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.54 + 100.64.21.54 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.168 + 100.64.41.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159093 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21472bc0-7b95-11ee-9581-a3221813a5fb + + + diff --git a/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd7c9c1edd011fbc7186d856486dc12e37f223ca --- /dev/null +++ b/graph/incidents_graphml/2/2152d330-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.131 + 100.64.44.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2152d330-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1235ddcf9eeb8b3195521b781858be83c1903b6c --- /dev/null +++ b/graph/incidents_graphml/2/21558a20-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.55 + 100.64.27.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516213 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21558a20-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a818779077f8e9d5b54393b52114a8354bc708c8 --- /dev/null +++ b/graph/incidents_graphml/2/21591f30-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.168 + 100.64.61.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21591f30-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f34ec848a1b098263f9ff792378eca48b2e1c95c --- /dev/null +++ b/graph/incidents_graphml/2/2162ffd0-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.131 + 100.64.44.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2162ffd0-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da2119c28621e05e22a587186574f71914bc02db --- /dev/null +++ b/graph/incidents_graphml/2/21654190-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.55 + 100.64.27.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516213 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21654190-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10bb0353c1597d957278ab9539db37ac5579281a --- /dev/null +++ b/graph/incidents_graphml/2/2169e810-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.168 + 100.64.61.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2169e810-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..697c2c5b7d7516fcd2564ca28a02de22908727ef --- /dev/null +++ b/graph/incidents_graphml/2/2174b2b0-7c09-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.145 + USER-0015-1317.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699208915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2174b2b0-7c09-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1950577f9274fc10564533f324ac203d1584144c --- /dev/null +++ b/graph/incidents_graphml/2/2175e3f0-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2175e3f0-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5aec5ffd1fa041c68685c9179d60637c5427cb80 --- /dev/null +++ b/graph/incidents_graphml/2/21769000-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923826 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21769000-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..071bd7fdb8b3bde7d9c563dae22bd6891837068d --- /dev/null +++ b/graph/incidents_graphml/2/2176c970-39b9-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.79 + 100.64.58.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.35 + 100.64.97.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.3 + USER-0015-2165.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.36 + 100.64.97.36 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.37 + 100.64.97.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.38 + 100.64.97.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.71 + 100.64.17.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2176c970-39b9-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b78030b0d1718c154203919edf336349eeb396d6 --- /dev/null +++ b/graph/incidents_graphml/2/21836820-36e7-11ef-997a-f7dc07e23a4a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.108.33 + USER-0015-1987.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719755180 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21836820-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755180 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21836820-36e7-11ef-997a-f7dc07e23a4a + + + diff --git a/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bb85b0c71bdfdb898dd409ee41ace733e8965ee --- /dev/null +++ b/graph/incidents_graphml/2/218820f0-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.24 + 100.64.19.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 218820f0-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19555d704e7367497970a8824c890c2991cdb3cb --- /dev/null +++ b/graph/incidents_graphml/2/218cb010-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694923826 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 218cb010-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec5120120408b7f7b7dfb2f8ecda415aee43109a --- /dev/null +++ b/graph/incidents_graphml/2/2191a590-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663558968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2191a590-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2191a590-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cc2e29bf755c4dc962e5847dd91677f8f23b727 --- /dev/null +++ b/graph/incidents_graphml/2/21978a40-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.24 + 100.64.19.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21978a40-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3b6d7075c97f4276a6dc56a2ed5b1fa691758c4 --- /dev/null +++ b/graph/incidents_graphml/2/219ccce0-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425375 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 219ccce0-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ca34b5853456cd0628dec7e993a34e527109587 --- /dev/null +++ b/graph/incidents_graphml/2/21a60930-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.26 + 100.64.19.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21a60930-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f477c63f8fc2a187d2125c6dccbfbcaf2624a66 --- /dev/null +++ b/graph/incidents_graphml/2/21b54b70-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.26 + 100.64.19.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21b54b70-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af2a4dbd0e0465a89ec1741f759a8167b3613479 --- /dev/null +++ b/graph/incidents_graphml/2/21d34350-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 21d34350-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9025e85095c76016aff8b3b1200c0ed0f12ef4f0 --- /dev/null +++ b/graph/incidents_graphml/2/21d427f0-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 21d427f0-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..701abef0dd4697d5acdd523c9d6231050e1594d5 --- /dev/null +++ b/graph/incidents_graphml/2/21e14e90-3acb-11ee-a022-b5e9f791d58e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.247 + 100.64.47.247 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692035461 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21e14e90-3acb-11ee-a022-b5e9f791d58e + + + diff --git a/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e54033153119f77de6e563f295981d21acc8fc9 --- /dev/null +++ b/graph/incidents_graphml/2/21e2fac0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.183 + 100.64.37.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 21e2fac0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c79064f755bf73a8aa063caff0f59885f115c29e --- /dev/null +++ b/graph/incidents_graphml/2/21ea3c30-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.104 + 100.64.30.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + USER-0015-1896.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Umbrella","Meraki"] + + + HOST + 100.64.81.116 + 100.64.81.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.117 + 100.64.81.117 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646005 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 21ea3c30-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..934a82a281d8aa59db4a4fed7b5d0c123644b3e4 --- /dev/null +++ b/graph/incidents_graphml/2/21f1a0c0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.124 + USER-0015-1334.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 21f1a0c0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15511468215ece72612ac57a225fc5015106913a --- /dev/null +++ b/graph/incidents_graphml/2/21f4c6e0-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.16 + 100.64.45.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21f4c6e0-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad78fa77454c2b4379259c1fddbe242cda482f43 --- /dev/null +++ b/graph/incidents_graphml/2/21ff8370-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.6 + 100.64.43.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 21ff8370-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c7b8d80377629193d8dff16126d7e0f2efe83b9 --- /dev/null +++ b/graph/incidents_graphml/2/2201bf30-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.18 + 100.64.45.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2201bf30-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41833e9da27cdb26a6cb5cdd8a7778f5e1b4928a --- /dev/null +++ b/graph/incidents_graphml/2/220440f0-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.153 + 100.64.47.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.55 + 100.64.1.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.8.30 + 100.64.8.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 220440f0-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e4bb67a2445a9268fb432e99fb3c44684c22830 --- /dev/null +++ b/graph/incidents_graphml/2/2205a400-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.202 + 100.64.38.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.131 + 100.64.52.131 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.1 + 100.64.56.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.71 + USER-0015-1414.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.2 + 100.64.56.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.13 + 100.64.36.13 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.3 + 100.64.56.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.4 + USER-0015-1415.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.5 + 100.64.56.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.6 + 100.64.56.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.7 + 100.64.56.7 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.8 + 100.64.56.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.9 + 100.64.56.9 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.89 + 100.64.26.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.10 + 100.64.56.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.11 + 100.64.56.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690722061 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2205a400-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..611f1807c90ae2ae7fc43936227dc6b6fd892a51 --- /dev/null +++ b/graph/incidents_graphml/2/22066c80-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.3 + 100.64.55.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22066c80-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..363054d05dd6eb844c0cbc9ea458b78aad524d02 --- /dev/null +++ b/graph/incidents_graphml/2/2208c6d0-ea5e-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.121 + 100.64.39.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.122 + 100.64.39.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711340051 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2208c6d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340051 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2208c6d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340051 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2208c6d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340051 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2208c6d0-ea5e-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6697497ee6ffffcb4a87c59a7aaaba25bc66759 --- /dev/null +++ b/graph/incidents_graphml/2/220cf0f0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 220cf0f0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..911701e96b82c100c64f987255bcd4caa7b5a7c2 --- /dev/null +++ b/graph/incidents_graphml/2/22101710-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.18 + 100.64.45.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22101710-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adea6910dfcadadf78c3e0ce77cc7b37827f64f7 --- /dev/null +++ b/graph/incidents_graphml/2/22149390-3acb-11ee-a022-b5e9f791d58e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692035462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22149390-3acb-11ee-a022-b5e9f791d58e + + + diff --git a/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53b4cb2016165f749c4d02e2e18ab717898a7d20 --- /dev/null +++ b/graph/incidents_graphml/2/221846d0-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.3 + 100.64.55.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041682 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 221846d0-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaedd59e04e5f4fb37a32e626521f8866d5257e0 --- /dev/null +++ b/graph/incidents_graphml/2/22188c40-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.178 + 100.64.35.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685772540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22188c40-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22188c40-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22188c40-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22188c40-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ee1c5956e4256d5ba8620516462e3cee0c55b32 --- /dev/null +++ b/graph/incidents_graphml/2/22199780-d3e8-11ee-bf59-a9ad7cebab5f.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.230 + 100.64.8.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.231 + 100.64.8.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.232 + 100.64.8.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.233 + 100.64.8.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22199780-d3e8-11ee-bf59-a9ad7cebab5f + + + diff --git a/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e54d2c9d97dc8227a4bd2309402356d107af1b19 --- /dev/null +++ b/graph/incidents_graphml/2/221ad3a0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 221ad3a0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da0c007a9dfcf987d8d9ad20262a6d533acbe663 --- /dev/null +++ b/graph/incidents_graphml/2/221b2fc0-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.22 + 100.64.64.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473479 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 221b2fc0-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87c72b4e6f53e87f0e3c60e676e283a66c2c7d69 --- /dev/null +++ b/graph/incidents_graphml/2/221d93a0-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.12 + 100.64.92.12 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302165 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 221d93a0-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e4a93da43e072c017df01d08a241a1799350443 --- /dev/null +++ b/graph/incidents_graphml/2/22242880-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.202 + 100.64.38.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722061 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22242880-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ef3b089ca26c81c63511138d39ae3cfdbf4374e --- /dev/null +++ b/graph/incidents_graphml/2/22276200-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.31 + 100.64.28.31 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041683 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22276200-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ddc08616baf4ac26d29cf9a4bbef4c5b90c115b --- /dev/null +++ b/graph/incidents_graphml/2/2229c7c0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.80 + 100.64.64.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934862 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2229c7c0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd12df9e29b35715c53e7e04a435517e45da790a --- /dev/null +++ b/graph/incidents_graphml/2/222eab00-f767-11ee-a32a-474576cc2660.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.129 + 100.64.70.129 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.38.223 + 100.64.38.223 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712773282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 222eab00-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 222eab00-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 222eab00-f767-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 222eab00-f767-11ee-a32a-474576cc2660 + + + diff --git a/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d1ee19902173782566e002cb11bebeff56644ef --- /dev/null +++ b/graph/incidents_graphml/2/224a6a00-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610655 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 224a6a00-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e2461db16b7c3cc3dfa34391a28fdd52f49e612 --- /dev/null +++ b/graph/incidents_graphml/2/2256f240-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.27 + 100.64.40.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2256f240-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee63c4fa5a30e2df246752ad5e5a76418bf5593a --- /dev/null +++ b/graph/incidents_graphml/2/225d72a0-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.147 + 100.64.7.147 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774668 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 225d72a0-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aeb42e1b7409b591ea0c7562659107f2494fe465 --- /dev/null +++ b/graph/incidents_graphml/2/22601990-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1669680587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22601990-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22601990-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml b/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52afeeabea73cf87778963d510042f9f5498a5d1 --- /dev/null +++ b/graph/incidents_graphml/2/22639f50-07c5-11ee-a204-2747d24db9a4.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.150 + 100.64.64.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.151 + 100.64.64.151 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.164 + 100.64.15.164 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.152 + 100.64.64.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.153 + 100.64.64.153 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.189 + 100.64.18.189 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.121 + 100.64.18.121 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.154 + 100.64.64.154 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.42 + 100.64.9.42 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.226 + 100.64.48.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.155 + 100.64.64.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.156 + 100.64.64.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.157 + 100.64.64.157 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.158 + 100.64.64.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.159 + 100.64.64.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.173 + 100.64.37.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + INCIDENT_LINK + 1686425376 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22639f50-07c5-11ee-a204-2747d24db9a4 + + + diff --git a/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..989a8fe272590d08f7aedf5a5c6c15889225d6ec --- /dev/null +++ b/graph/incidents_graphml/2/22665b90-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.27 + 100.64.40.27 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934863 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22665b90-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd397343aa310cef69d917bc7888838773654ae8 --- /dev/null +++ b/graph/incidents_graphml/2/227576c0-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.170 + 100.64.11.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 227576c0-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b6932dde34854a4f091477d4d969b70bf314d31 --- /dev/null +++ b/graph/incidents_graphml/2/227e8f30-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 227e8f30-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba87e008810981bf89a65e4628246650555edceb --- /dev/null +++ b/graph/incidents_graphml/2/228b7b90-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.130 + 100.64.78.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + USER-0015-1611.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.131 + 100.64.78.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 228b7b90-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 228b7b90-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 228b7b90-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 228b7b90-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..173392f9ce603581b8fe5b4f1e8cce310b0a5b3b --- /dev/null +++ b/graph/incidents_graphml/2/22906980-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22906980-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4af423fc3bfa945a5454293d176e13345be4e40b --- /dev/null +++ b/graph/incidents_graphml/2/229d7f00-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.175 + 100.64.65.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842390 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 229d7f00-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..914e6ab26622f7027dc3d79006df32683aa5de4d --- /dev/null +++ b/graph/incidents_graphml/2/229d99b0-3acb-11ee-a022-b5e9f791d58e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692035463 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 229d99b0-3acb-11ee-a022-b5e9f791d58e + + + diff --git a/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml new file mode 100644 index 0000000000000000000000000000000000000000..771e6640fdd09bcdf553f15ff9393c4516f987d8 --- /dev/null +++ b/graph/incidents_graphml/2/22a96050-13a2-11ef-ad44-1f39f7953267.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.20.68 + 100.64.20.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1715877255 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22a96050-13a2-11ef-ad44-1f39f7953267 + + + diff --git a/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39eef31439bfae9106c39b88f95b0d9ec8918df0 --- /dev/null +++ b/graph/incidents_graphml/2/22af2fa0-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.5 + 100.64.55.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041683 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22af2fa0-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd943f8014241e30c8f6396072ff64728c1a7c8b --- /dev/null +++ b/graph/incidents_graphml/2/22b1acd0-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.28 + 100.64.19.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b1acd0-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd31521187c04aeae39683d4bd7b196df11d7b8e --- /dev/null +++ b/graph/incidents_graphml/2/22b751a0-56b6-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.47 + 100.64.69.47 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.48 + 100.64.69.48 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.95 + 100.64.12.95 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.49 + 100.64.69.49 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695105076 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22b751a0-56b6-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7a162967af129ec829a4e0c237e0421b485f3ab --- /dev/null +++ b/graph/incidents_graphml/2/22babdb0-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.156 + 100.64.36.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519408 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22babdb0-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a91589bf7be87df95d1a025c45e1e5e77672f3b --- /dev/null +++ b/graph/incidents_graphml/2/22c18e60-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.135 + USER-0015-1274.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22c18e60-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f0fa2fa5c2c9c3e62cce2270fac7d055886c596 --- /dev/null +++ b/graph/incidents_graphml/2/22c305c0-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.15 + 100.64.32.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041684 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22c305c0-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17ba3119c84119b7f87dae1ad935856344c49917 --- /dev/null +++ b/graph/incidents_graphml/2/22c3ae30-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.28 + 100.64.19.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22c3ae30-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f2dfc8d4c8cdb6fb385a8bac143d60f464e23a3 --- /dev/null +++ b/graph/incidents_graphml/2/22c545f0-3acb-11ee-a022-b5e9f791d58e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.248 + 100.64.47.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692035463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22c545f0-3acb-11ee-a022-b5e9f791d58e + + + diff --git a/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f66f3946f684349fef1b5bf0e3713ade27dbd5c3 --- /dev/null +++ b/graph/incidents_graphml/2/22c7ca60-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.170 + 100.64.61.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22c7ca60-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a12d7cf744461117a44a0cebc56b119e3046c920 --- /dev/null +++ b/graph/incidents_graphml/2/22c84680-1340-11ef-90d6-79b9e3bf2217.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.34 + 100.64.37.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.237 + 100.64.56.237 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.238 + 100.64.56.238 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.195 + 100.64.29.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.38.158 + 100.64.38.158 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.239 + 100.64.56.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835165 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22c84680-1340-11ef-90d6-79b9e3bf2217 + + + diff --git a/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecbdd3204237e1d8853e1bb6566e39482e25f8bb --- /dev/null +++ b/graph/incidents_graphml/2/22cbc5f0-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.165 + 100.64.22.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22cbc5f0-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3f8ec7c3647cf0bdc94bb21a99bc5f439d4ba4f --- /dev/null +++ b/graph/incidents_graphml/2/22d70ca0-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.4 + 100.64.30.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22d70ca0-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b550c57d2453aa7b806f8a035319c90950c7f1da --- /dev/null +++ b/graph/incidents_graphml/2/22d7ed50-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.15 + 100.64.32.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041684 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22d7ed50-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..954d3074538210e86297e6d5bf07454adc0dec60 --- /dev/null +++ b/graph/incidents_graphml/2/22d898d0-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.135 + USER-0015-1274.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622384 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22d898d0-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb9edb5b12b110ce14e1280571a05ced968ff969 --- /dev/null +++ b/graph/incidents_graphml/2/22d95a80-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.165 + 100.64.22.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22d95a80-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dd8fa67fa82753030470c5e77e0c2cfb52f05f8 --- /dev/null +++ b/graph/incidents_graphml/2/22df0600-15b5-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.95.87 + USER-0015-2129.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105319 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22df0600-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105319 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22df0600-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105319 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22df0600-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105319 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 22df0600-15b5-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24be195ccfb477dc014a4f456276c56ecaa6543a --- /dev/null +++ b/graph/incidents_graphml/2/22e58b90-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.4 + 100.64.30.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 22e58b90-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5a6e8cca042cb5be36b35ae7a27178718378972 --- /dev/null +++ b/graph/incidents_graphml/2/22ec1cb0-675e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,813 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.83 + 100.64.12.83 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.84 + 100.64.12.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.6 + 100.64.12.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.147 + 100.64.7.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.85 + 100.64.12.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.86 + 100.64.12.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.87 + 100.64.12.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.89 + 100.64.12.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.90 + 100.64.12.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.91 + 100.64.12.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.92 + 100.64.12.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.93 + 100.64.12.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.62 + 100.64.12.62 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.94 + 100.64.12.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.95 + 100.64.12.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.96 + 100.64.12.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.97 + 100.64.12.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.98 + 100.64.12.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.99 + 100.64.12.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec1cb0-675e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bdcd4f92dc08d0b367598f8bc277fba0ebd7837 --- /dev/null +++ b/graph/incidents_graphml/2/22ec3780-7c09-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.190 + 100.64.18.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699208917 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22ec3780-7c09-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6ddab20a7af4fd8ad16f051334093fe96766efc --- /dev/null +++ b/graph/incidents_graphml/2/22f34730-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22f34730-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..297cc08975acb8848afb8a02fc283067bfe7898e --- /dev/null +++ b/graph/incidents_graphml/2/22f41010-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.49 + 100.64.25.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 22f41010-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9177578ca40fe17cb968b4439f22f15b520c69e7 --- /dev/null +++ b/graph/incidents_graphml/2/22f998a0-30ed-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.53 + 100.64.53.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.214 + 100.64.48.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.46 + 100.64.46.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.206 + 100.64.46.206 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.54 + 100.64.53.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.228 + 100.64.3.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098052 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 22f998a0-30ed-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdbba62b73920ea0dad3b8237808e0ac03d435a7 --- /dev/null +++ b/graph/incidents_graphml/2/23021440-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.223 + 100.64.15.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23021440-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09297c6b19b031a886d5e1076c01591aaab3fb86 --- /dev/null +++ b/graph/incidents_graphml/2/23044a20-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.90.65 + 172.25.90.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.92.16 + 100.64.92.16 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.133 + 100.64.88.133 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23044a20-50c0-11ed-875b-db834c6ab2cd + + + INCIDENT_LINK + 1666302166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23044a20-50c0-11ed-875b-db834c6ab2cd + + + INCIDENT_LINK + 1666302166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23044a20-50c0-11ed-875b-db834c6ab2cd + + + INCIDENT_LINK + 1666302166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23044a20-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05ff6820358c519a92fb48cf77f3b0c1e64e828a --- /dev/null +++ b/graph/incidents_graphml/2/2308a880-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2308a880-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc582084fa808d2eac5a515935c9d837b17afab6 --- /dev/null +++ b/graph/incidents_graphml/2/2310bfd0-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.49 + 100.64.25.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622384 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2310bfd0-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36dbc05fc1d18722e84310d5d2ddc08ffc522943 --- /dev/null +++ b/graph/incidents_graphml/2/23127fa0-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.132.243 + 172.21.132.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.72 + 100.64.90.72 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.143 + 100.64.95.143 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.144 + 100.64.95.144 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.145 + 100.64.95.145 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23127fa0-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb0c3456d03cd8d6a1e6a7b641070d53a8fd682e --- /dev/null +++ b/graph/incidents_graphml/2/23220770-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.237 + 100.64.95.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23220770-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56bfa87754b3fa69982d7b3a07961930f35c1bf7 --- /dev/null +++ b/graph/incidents_graphml/2/23253bc0-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.237 + 100.64.95.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23253bc0-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f418a590808b02bd7125c393a5e70896371a9898 --- /dev/null +++ b/graph/incidents_graphml/2/23275ea0-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.65 + 100.64.59.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 23275ea0-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5573fc96995f3d98ed0d18b63a4ce0e70570f60 --- /dev/null +++ b/graph/incidents_graphml/2/232d2b00-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.59.65 + 100.64.59.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 232d2b00-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad1e50394918720ee79b27a43a4f54e4e9e1b097 --- /dev/null +++ b/graph/incidents_graphml/2/232d8a00-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.65 + 100.64.59.65 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 232d8a00-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c247c8c1454de8aa970f3c4552263274c75d11a0 --- /dev/null +++ b/graph/incidents_graphml/2/23325b20-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.241 + 100.64.95.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23325b20-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87946a89834cfec5ee6e7f1c6578cd3e1000985c --- /dev/null +++ b/graph/incidents_graphml/2/233652c0-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.95.241 + 100.64.95.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 233652c0-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b1ad682c2d4ed266b6116313c8c9c68beb8a6f5 --- /dev/null +++ b/graph/incidents_graphml/2/233abf90-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.234.64.242 + 10.234.64.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.218.122 + 172.26.218.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 233abf90-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88c54a792fe460c2855c5a5a8a28f2376419ec5b --- /dev/null +++ b/graph/incidents_graphml/2/233dddb0-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.65 + 100.64.59.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842391 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 233dddb0-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87e480e9d08cb8758d792595cf37f9287e170f86 --- /dev/null +++ b/graph/incidents_graphml/2/2343e430-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.102 + 100.64.17.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379331 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2343e430-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e2bdab20e035390a10ec2e6acf03afe37e4925c --- /dev/null +++ b/graph/incidents_graphml/2/2346cd80-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.238 + 100.64.95.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2346cd80-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58168bba12e53c482588f3a0ff6c84650ac79a3a --- /dev/null +++ b/graph/incidents_graphml/2/234a8720-9e16-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.111 + 100.64.69.111 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.147 + 100.64.70.147 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952841 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 234a8720-9e16-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70182ee13e15ce45a2faacbb0ccf3e2cf66024e1 --- /dev/null +++ b/graph/incidents_graphml/2/234c99e0-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.238 + 100.64.95.238 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 234c99e0-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml b/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3c80103f29d549b36a508852440b278a7d5664d --- /dev/null +++ b/graph/incidents_graphml/2/23504360-432f-11ed-b89e-1d3afc384aa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664810525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 23504360-432f-11ed-b89e-1d3afc384aa8 + + + diff --git a/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..caec457811b1853f6b6b2dc9dcad3fe73a070bdb --- /dev/null +++ b/graph/incidents_graphml/2/2356f700-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.49 + 100.64.14.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379331 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2356f700-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4d8906bb53473627c4b245d0980ebc8838a8e80 --- /dev/null +++ b/graph/incidents_graphml/2/2359f9b0-675e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,853 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.118 + 100.64.12.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.119 + 100.64.12.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.120 + 100.64.12.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.121 + 100.64.12.121 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.122 + 100.64.12.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.123 + 100.64.12.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.81 + 100.64.8.81 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.31 + 100.64.12.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.32 + 100.64.12.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.34 + 100.64.12.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.35 + 100.64.12.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.36 + 100.64.12.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.37 + 100.64.12.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.38 + 100.64.12.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.124 + 100.64.12.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696936451 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2359f9b0-675e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65ace104c3e7d8777bd969229bf15780bbc34043 --- /dev/null +++ b/graph/incidents_graphml/2/23642900-097e-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,581 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.179 + 100.64.69.179 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.180 + 100.64.69.180 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.54.94 + 100.64.54.94 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.28.1 + USER-0015-1515.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.16.144 + 100.64.16.144 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.11 + HOST-12183 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.181 + USER-0015-1529.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.37 + USER-0015-1530.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.325 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614785 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23642900-097e-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8821936ce30bfe5acc2b3c821f243ea21007bf3 --- /dev/null +++ b/graph/incidents_graphml/2/23670170-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.126 + 100.64.51.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.253 + 100.64.36.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.127 + 100.64.51.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.229 + 100.64.2.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.128 + 100.64.51.128 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23670170-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml b/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dbd595d57168715dfaa39062baf963bbcbf8d09 --- /dev/null +++ b/graph/incidents_graphml/2/236fce20-5282-11ee-bc88-2ddcf292f958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.20 + 100.64.45.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694642938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 236fce20-5282-11ee-bc88-2ddcf292f958 + + + diff --git a/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1a424995ae0bb79eb057338f4a3a9bf8c0548c1 --- /dev/null +++ b/graph/incidents_graphml/2/2378dbc0-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.132 + 100.64.51.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.133 + 100.64.51.133 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.134 + 100.64.51.134 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.135 + 100.64.51.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2378dbc0-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml b/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..731ec9f239b4050dff8923ffc44e39dbeeb3b6fd --- /dev/null +++ b/graph/incidents_graphml/2/237bebc0-3acb-11ee-a022-b5e9f791d58e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692035464 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 237bebc0-3acb-11ee-a022-b5e9f791d58e + + + diff --git a/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46136893be7afb09eb92152c2c9b3303da50ad9b --- /dev/null +++ b/graph/incidents_graphml/2/23807020-fa6a-11ec-afb6-b9a2c990c2ed.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.203 + 100.64.78.203 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + USER-0015-1622.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.204 + 100.64.78.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656809431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23807020-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23807020-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23807020-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23807020-fa6a-11ec-afb6-b9a2c990c2ed + + + diff --git a/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79cdd5892b4f0a20ce70e5c45f55779c442711de --- /dev/null +++ b/graph/incidents_graphml/2/2381bcb0-2ed9-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.204 + USER-0015-1338.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690722063 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2381bcb0-2ed9-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3c801fa2d28a01b2cbf504e7cc7cf42ab3cfb12 --- /dev/null +++ b/graph/incidents_graphml/2/23920910-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.234 + 100.64.41.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.140 + 100.64.51.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.224 + 100.64.14.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.12 + 100.64.2.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23920910-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4c835bbd508d835a151fc2b3946c19c9d9a3188 --- /dev/null +++ b/graph/incidents_graphml/2/239f2870-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.142 + 100.64.51.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.139 + 100.64.20.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 239f2870-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 239f2870-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 239f2870-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 239f2870-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c444725b44fd300b952d04822768681371fb2439 --- /dev/null +++ b/graph/incidents_graphml/2/23adfd00-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434017 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23adfd00-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0746f9af7b3710c31531d4d94a6c6bf1602ccc5a --- /dev/null +++ b/graph/incidents_graphml/2/23af82f0-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.65.77 + USER-0015-2134.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.95.149 + 100.64.95.149 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719581237 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23af82f0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581237 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23af82f0-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2060ebfe3c310532ac56801f9798ae828ba82bfb --- /dev/null +++ b/graph/incidents_graphml/2/23b29f90-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.172 + 100.64.61.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23b29f90-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..625cd2d3b1e4a2908c237d76f8a375ae38a82639 --- /dev/null +++ b/graph/incidents_graphml/2/23b39dc0-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.55 + USER-0015-1516.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686951082 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23b39dc0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951082 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23b39dc0-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abd30e8e07051883fe4c76e195af9fe807b31165 --- /dev/null +++ b/graph/incidents_graphml/2/23b7d520-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.172 + 100.64.47.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575376 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23b7d520-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..644fecb312c0844b6fa3ea0b44e3dd5292386619 --- /dev/null +++ b/graph/incidents_graphml/2/23c82360-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.172 + 100.64.61.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040785 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23c82360-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5248ffc3be0d9f13cecadcfadd0fa13fbdff1df0 --- /dev/null +++ b/graph/incidents_graphml/2/23c84fe0-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.172 + 100.64.47.172 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575376 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23c84fe0-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5820f290b4e80d9242f08e4246575a07daf791a3 --- /dev/null +++ b/graph/incidents_graphml/2/23cb7470-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.74 + USER-0015-1189.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287711 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23cb7470-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c15bdc428a77e7354807934ad356859b7fb394e --- /dev/null +++ b/graph/incidents_graphml/2/23cb9000-3826-11ee-b5a7-eb9164a8ca63.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.70.142 + 100.64.70.142 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.47.81 + 100.64.47.81 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.135 + 100.64.23.135 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.143 + 100.64.70.143 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744695 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23cb9000-3826-11ee-b5a7-eb9164a8ca63 + + + diff --git a/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a040838a5d5291ba665fc111cb4516c0de4e1a5 --- /dev/null +++ b/graph/incidents_graphml/2/23d456c0-1329-11ef-aba1-33e212db0be8.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.2 + 100.64.5.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.158 + 100.64.55.158 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.159 + 100.64.55.159 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.160 + 100.64.55.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.9 + 100.64.22.9 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.55.161 + 100.64.55.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825288 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23d456c0-1329-11ef-aba1-33e212db0be8 + + + diff --git a/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2569d509997c5ed9954ccacfa73157b6e1ea0736 --- /dev/null +++ b/graph/incidents_graphml/2/23d8a390-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.102 + 100.64.64.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575377 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23d8a390-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..343c940af1bb101b5dd1f9dd761a54c1b6f20ff5 --- /dev/null +++ b/graph/incidents_graphml/2/23da99f0-4d08-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694040785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23da99f0-4d08-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..457cab5534a6249c049e9be902d94a6156735aed --- /dev/null +++ b/graph/incidents_graphml/2/23e08310-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.74 + USER-0015-1189.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 23e08310-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cfbf2f4f9d41fe2eb457d9b451d25842c3ae4dc --- /dev/null +++ b/graph/incidents_graphml/2/23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.246 + 100.64.22.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23e41bd0-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4db8ce41190c4e8e7fafde6cb21133747fddce4c --- /dev/null +++ b/graph/incidents_graphml/2/23f41720-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462481 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f41720-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d488cd74eeadcbe1f70c2e968cc66934031229d --- /dev/null +++ b/graph/incidents_graphml/2/23f63640-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.110 + HOST-13623 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127093 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f63640-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127093 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f63640-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6228392ce7f1e5430d0a8a9dbf312e833df1bcb5 --- /dev/null +++ b/graph/incidents_graphml/2/23f88250-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.54 + 100.64.13.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.210 + 100.64.6.210 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.120 + 100.64.46.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.121 + 100.64.46.121 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.122 + USER-0015-1357.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.196 + 100.64.38.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.108 + 100.64.8.108 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.38 + 100.64.6.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.123 + 100.64.46.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.166 + 100.64.3.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.124 + 100.64.46.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.191 + 100.64.4.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 23f88250-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e85fd2ac6d51e140164bcf745be770e91db21831 --- /dev/null +++ b/graph/incidents_graphml/2/23f884b0-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.1 + 100.64.11.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363739 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23f884b0-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71eda683b87c54ef734da33e0e97e80b4b9de5df --- /dev/null +++ b/graph/incidents_graphml/2/23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.246 + 100.64.22.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 23f9c6b0-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6296cb5f51267097805dd5e582873041bbcf26ba --- /dev/null +++ b/graph/incidents_graphml/2/24050570-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.130 + 100.64.46.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.131 + 100.64.46.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.132 + 100.64.46.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.133 + 100.64.46.133 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.134 + USER-0015-1358.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24050570-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb4253ad21ac01a0f01eb71ba066d054241000ac --- /dev/null +++ b/graph/incidents_graphml/2/24070d20-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.247 + 100.64.22.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379332 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24070d20-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d1fa3932a83ac562b83b8c52c0b9cdcac216649 --- /dev/null +++ b/graph/incidents_graphml/2/24083c20-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.1 + 100.64.11.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24083c20-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d620376c65512eed050349bf21ee821db6beb8b --- /dev/null +++ b/graph/incidents_graphml/2/240f6a20-4ada-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.136 + 100.64.19.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693801126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 240f6a20-4ada-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..404357b3a84e88adf9c3f0ecc75e0dbd4d0950e8 --- /dev/null +++ b/graph/incidents_graphml/2/240fdc80-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.204 + 100.64.31.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 240fdc80-1a4c-11ee-a525-9fcef38978a9 + + + INCIDENT_LINK + 1688462482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 240fdc80-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ac50b7b36c686ddbdb91b62fb6116716e3f5bbb --- /dev/null +++ b/graph/incidents_graphml/2/24118890-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.140 + 100.64.46.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.136.143.35 + 10.136.143.35 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.141 + 100.64.46.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105355 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24118890-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24118890-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24118890-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105355 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24118890-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0820877b89e764b6f8555d9b4bf35078bd5df04e --- /dev/null +++ b/graph/incidents_graphml/2/2415da30-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.247 + 100.64.22.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379333 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2415da30-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e78c6883193112e0e6c538550b0f149d0e655eec --- /dev/null +++ b/graph/incidents_graphml/2/24183ff0-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.5 + USER-0015-1304.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 24183ff0-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbf5c2254208a1d8c15c885620da240b82972161 --- /dev/null +++ b/graph/incidents_graphml/2/2418b730-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.123 + 100.64.66.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2418b730-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..911bd2a51a733778bcddb7816d7770a19d77888f --- /dev/null +++ b/graph/incidents_graphml/2/241f44a0-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.119 + 100.64.81.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.255 + 100.64.12.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687646008 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 241f44a0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646008 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 241f44a0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646008 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 241f44a0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646008 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 241f44a0-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b35ac87291cdbff1bae8d821bfd719c2675f7ace --- /dev/null +++ b/graph/incidents_graphml/2/2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379333 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2425b8b0-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f2f056d5aef8001c9987568a288b8a6231d9974 --- /dev/null +++ b/graph/incidents_graphml/2/24295b80-076b-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.38 + 100.64.24.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1714534222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24295b80-076b-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml b/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd134bcd4cc940c2fa3652c5efad540b7f27d04c --- /dev/null +++ b/graph/incidents_graphml/2/242cdb70-d309-11ee-8784-05d0e5a99247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.123 + 100.64.66.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708774671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 242cdb70-d309-11ee-8784-05d0e5a99247 + + + diff --git a/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fca0783c3393df7f65db252467befd91ef8cb215 --- /dev/null +++ b/graph/incidents_graphml/2/242de060-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.43 + 100.64.38.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 242de060-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab27845336c861ab003bad7f0f139cfe5977bdc9 --- /dev/null +++ b/graph/incidents_graphml/2/24357020-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379333 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24357020-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf22e47b40ad95679bc63d52d6f7c5a3ba236a92 --- /dev/null +++ b/graph/incidents_graphml/2/24382760-fa6a-11ec-afb6-b9a2c990c2ed.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.205 + 100.64.78.205 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.92 + USER-0015-1614.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656809432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24382760-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24382760-fa6a-11ec-afb6-b9a2c990c2ed + + + diff --git a/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml b/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..348c72db16f0816de4f3abdcdd9bb8253d7a3fc3 --- /dev/null +++ b/graph/incidents_graphml/2/24449cb0-de8f-11ee-a3b8-fb4031711de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.43 + 100.64.38.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710041686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24449cb0-de8f-11ee-a3b8-fb4031711de5 + + + diff --git a/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35cbf8c6cb2164ad9f292a8cd45bd190a3b8d2cd --- /dev/null +++ b/graph/incidents_graphml/2/2448d670-ab75-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.213 + 100.64.10.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1676275512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2448d670-ab75-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b18faa3713086f61d77ccea4214f4f4c23995650 --- /dev/null +++ b/graph/incidents_graphml/2/244d08d0-2d61-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.202 + 100.64.56.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.244 + 100.64.20.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.203 + 100.64.56.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.204 + 100.64.56.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.205 + 100.64.56.205 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.206 + 100.64.56.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.87 + 100.64.48.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.57 + 100.64.16.57 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.207 + 100.64.56.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.7 + 100.64.25.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.129 + 100.64.32.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.208 + 100.64.56.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.76 + 100.64.18.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.209 + 100.64.56.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.83 + 100.64.5.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + INCIDENT_LINK + 1690560574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 244d08d0-2d61-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50d0624af619bc40376ab7a8d82678292e77c98b --- /dev/null +++ b/graph/incidents_graphml/2/244ddf80-ab75-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.10.213 + 100.64.10.213 + ["Exploiting Host"] + 0.83125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676275512 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 244ddf80-ab75-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc5c1aab05e4a97b99bb386ce41137630b9b58c9 --- /dev/null +++ b/graph/incidents_graphml/2/2450c5b0-ab75-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.14 + 100.64.93.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1676275512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2450c5b0-ab75-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml b/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..921fb89d6992a59c23cc386b3dd4cf5b5c1fc8be --- /dev/null +++ b/graph/incidents_graphml/2/2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.115 + 100.64.4.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703379333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2456dad0-a1f7-11ee-8ea5-ed4d8a04fd83 + + + diff --git a/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dce0828bc03ef8ca3f2187929beed8849ad588eb --- /dev/null +++ b/graph/incidents_graphml/2/2469cab0-39b9-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.5.80 + 172.29.5.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.14 + 100.64.87.14 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2469cab0-39b9-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2469cab0-39b9-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..242539ca157aeed7a2fc18273016034205d011e0 --- /dev/null +++ b/graph/incidents_graphml/2/24732100-9eb8-11ee-9861-037a800baf91.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.77 + 100.64.22.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.138 + 100.64.90.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.139 + 100.64.90.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.90.140 + 100.64.90.140 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.46 + 100.64.40.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.34.131 + 100.64.34.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.18 + 100.64.2.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.12 + 100.64.10.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.141 + 100.64.90.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.90.142 + 100.64.90.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.143 + 100.64.90.143 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.165 + USER-0015-1449.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.144 + 100.64.90.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.136 + 100.64.90.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.145 + 100.64.90.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022421 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24732100-9eb8-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..628f52c2c81320451b690a195d9cbc3b17a0884b --- /dev/null +++ b/graph/incidents_graphml/2/2473ae90-1f06-11ee-984e-6dd184c65476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.139 + HOST-9960 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688982173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2473ae90-1f06-11ee-984e-6dd184c65476 + + + diff --git a/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92c6a7c8533124ad8f7696207f9b7e6c9f3ee4cc --- /dev/null +++ b/graph/incidents_graphml/2/24773ac0-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.158 + 100.64.36.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.159 + 100.64.36.159 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.160 + 100.64.36.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.161 + 100.64.36.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.162 + 100.64.36.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.136 + 100.64.14.136 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.163 + 100.64.36.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.106 + 100.64.8.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.164 + 100.64.36.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.165 + 100.64.36.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.166 + 100.64.36.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.167 + 100.64.36.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.190 + 100.64.18.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.168 + 100.64.36.168 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.169 + 100.64.36.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519411 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24773ac0-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff95c9952bb234e7e4ac6933b7c02956aaf9a292 --- /dev/null +++ b/graph/incidents_graphml/2/247db980-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 247db980-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml b/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b8ebbf215b755ee5e11f497ee30163e836a0ac0 --- /dev/null +++ b/graph/incidents_graphml/2/249ccbe0-13a2-11ef-ad44-1f39f7953267.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.61 + 100.64.86.61 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715877259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 249ccbe0-13a2-11ef-ad44-1f39f7953267 + + + diff --git a/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04b0bfea3cde4548dca78473a8313b396a8cfec0 --- /dev/null +++ b/graph/incidents_graphml/2/24aac790-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874245 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 24aac790-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8db2d80f6929d1bb7d33994858a361cbe9c31974 --- /dev/null +++ b/graph/incidents_graphml/2/24ae3f60-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24ae3f60-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml b/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8584591ea183377bf66126046d0fd90e235656e --- /dev/null +++ b/graph/incidents_graphml/2/24bb6960-9d5f-11ee-8404-258d9cb65446.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702874245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24bb6960-9d5f-11ee-8404-258d9cb65446 + + + diff --git a/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db31cc6c27a211ebbab9525aa12a1ed7315595a1 --- /dev/null +++ b/graph/incidents_graphml/2/24cbac90-22ca-11ee-a717-3b672dfcef5e.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.161 + 100.64.47.161 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.162 + 100.64.47.162 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.238 + 100.64.8.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.217 + 100.64.35.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.163 + 100.64.47.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.164 + 100.64.47.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.165 + 100.64.47.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24cbac90-22ca-11ee-a717-3b672dfcef5e + + + diff --git a/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e361521dccb58e0e65318f3422580b46ec60bdb --- /dev/null +++ b/graph/incidents_graphml/2/24cc74c0-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.7 + 100.64.35.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24cc74c0-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e13e9e9c035b7840854527ef38f5608091cf7b47 --- /dev/null +++ b/graph/incidents_graphml/2/24cfd900-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.31.217 + 100.64.31.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685371824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24cfd900-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..439db90ffa52c2b02b4a8a4249792e62304cebba --- /dev/null +++ b/graph/incidents_graphml/2/24d62690-5ce3-11ee-888f-c5a21ae2b888.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.127 + 100.64.44.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.128 + 100.64.44.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695784114 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24d62690-5ce3-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784114 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24d62690-5ce3-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784114 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24d62690-5ce3-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784114 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24d62690-5ce3-11ee-888f-c5a21ae2b888 + + + diff --git a/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..324d2469db0d3411489204e283ea2d940965e18c --- /dev/null +++ b/graph/incidents_graphml/2/24dbb700-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.7 + 100.64.35.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 24dbb700-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7a6b8b06416ef39864b4a933c0bbc989d51c0ba --- /dev/null +++ b/graph/incidents_graphml/2/24e35600-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.117 + 100.64.66.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013728 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24e35600-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8131f2a4aef56cdc465fc27901833fb1f2664a0 --- /dev/null +++ b/graph/incidents_graphml/2/24e3f340-456b-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.232 + 100.64.25.232 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.234 + 100.64.25.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.18 + 100.64.24.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24e3f340-456b-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2de2ed437cc40836cb1bb0853696e110b5e74b8a --- /dev/null +++ b/graph/incidents_graphml/2/24e8a780-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.177 + 100.64.65.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24e8a780-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7710d45da2bc0f293fa9a4fc44cc781059bd8f91 --- /dev/null +++ b/graph/incidents_graphml/2/24f09d70-456b-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.238 + 100.64.25.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.239 + 100.64.25.239 + ["Exploiting Host"] + 0.814375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.14 + 100.64.6.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.240 + 100.64.25.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.241 + 100.64.25.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.242 + 100.64.25.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.181 + 100.64.23.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.243 + 100.64.25.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.244 + 100.64.25.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.245 + 100.64.25.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.246 + 100.64.25.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.247 + 100.64.25.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.248 + 100.64.25.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.201 + 100.64.25.201 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.249 + 100.64.25.249 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203697 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 24f09d70-456b-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeab76411a58a80644cc5688ae8c080ae8039125 --- /dev/null +++ b/graph/incidents_graphml/2/24f1ab20-22ca-11ee-a717-3b672dfcef5e.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.104 + 100.64.34.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.170 + 100.64.47.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.171 + 100.64.47.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.21 + USER-0015-1369.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.172 + 100.64.47.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.173 + 100.64.47.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.174 + 100.64.47.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 24f1ab20-22ca-11ee-a717-3b672dfcef5e + + + diff --git a/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1deafe0ad67e9c12c596d81fe289a03e01fee7ac --- /dev/null +++ b/graph/incidents_graphml/2/24f641c0-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.117 + 100.64.66.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24f641c0-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5546eb7c05a20c0d44f59c50837dab6e3c2e129 --- /dev/null +++ b/graph/incidents_graphml/2/24f79ba0-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.177 + 100.64.65.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24f79ba0-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ced41d504ab150202e45c2a46d52a1704bf14e98 --- /dev/null +++ b/graph/incidents_graphml/2/24fda320-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.247 + 100.64.18.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 24fda320-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba80ba21f25ed6b0d573bb778410886c3ad9f5ef --- /dev/null +++ b/graph/incidents_graphml/2/25043e30-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.51 + 100.64.8.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434019 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25043e30-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ef446b1371d91bbe1280b7198e80dc0ea265713 --- /dev/null +++ b/graph/incidents_graphml/2/25081660-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.179 + 100.64.65.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842394 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25081660-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96f6f34fa63ebcfd7f1fe8e9a9372aa785613a91 --- /dev/null +++ b/graph/incidents_graphml/2/2508df60-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.119 + 100.64.66.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013728 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2508df60-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..878eba0df6beaf18c899c2112081fc58b5c32e2f --- /dev/null +++ b/graph/incidents_graphml/2/2510a3e0-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.65 + 100.64.47.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591041 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2510a3e0-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml b/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36f95bc1ae946cf8ec9aaa73c295f9e4ee1d5686 --- /dev/null +++ b/graph/incidents_graphml/2/25149640-33fe-11ee-b117-451e0594ac2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.76 + USER-0015-1190.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691287713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25149640-33fe-11ee-b117-451e0594ac2f + + + diff --git a/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4d9b8af99657ad2ce6bf0d465a63b53b672da85 --- /dev/null +++ b/graph/incidents_graphml/2/25168db0-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.51 + 100.64.8.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434019 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25168db0-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3aacdfe7fe5162e37da5c30655e8afca200e8503 --- /dev/null +++ b/graph/incidents_graphml/2/25190c00-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.119 + 100.64.66.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013729 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 25190c00-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc896849b3f3f67a70e6ec12e87ca698de32cb17 --- /dev/null +++ b/graph/incidents_graphml/2/251bbc50-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,171 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.149 + 100.64.38.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.150 + 100.64.38.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.151 + 100.64.38.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 251bbc50-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b023874b66c910a728aac7ab238e9a915bf5208f --- /dev/null +++ b/graph/incidents_graphml/2/2521e1f0-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.65 + 100.64.47.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591042 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2521e1f0-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0dc087eb9a44b494202381a587b14427c158299 --- /dev/null +++ b/graph/incidents_graphml/2/252248f0-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1686951084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 252248f0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 252248f0-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a122046c3678d78083e7483023f3a56f5dfd4ff --- /dev/null +++ b/graph/incidents_graphml/2/252cc970-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 252cc970-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd45a0196fddf2e0e042046fb750679d80b1dde4 --- /dev/null +++ b/graph/incidents_graphml/2/25373160-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.56 + 100.64.65.56 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.70.250 + HOST-13014 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.162 + 100.64.72.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.163 + 100.64.72.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.53 + 100.64.1.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.164 + 100.64.72.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.165 + 100.64.72.165 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.166 + 100.64.72.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.8.207 + 100.64.8.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.12.91 + 100.64.12.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25373160-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..501fba8a023b0870992790446c3c27b40b4269ac --- /dev/null +++ b/graph/incidents_graphml/2/253bb150-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.9 + 100.64.35.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 253bb150-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 253bb150-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c89d5f908072b9adc82a9a491ae1b10becfd405f --- /dev/null +++ b/graph/incidents_graphml/2/253bec80-0e2f-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.233 + 100.64.71.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687130614 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 253bec80-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 253bec80-0e2f-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb6d3c7a9c73805961b457fba9cc77c361bc9a21 --- /dev/null +++ b/graph/incidents_graphml/2/25484c10-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.53 + 100.64.8.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434019 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25484c10-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6800ac2c08623903ad42e761451853e924a6910 --- /dev/null +++ b/graph/incidents_graphml/2/254c3850-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 254c3850-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe13c05a04dcec0ef326173cd70196366639129a --- /dev/null +++ b/graph/incidents_graphml/2/254c5320-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.9 + 100.64.35.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 254c5320-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b15b3b21fc0b6a31e67d1a261339469e895ee9ef --- /dev/null +++ b/graph/incidents_graphml/2/25512200-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.13.25 + 192.168.13.25 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch","FireEye Endpoint Security (HX Series)"] + + + HOST + 100.64.72.169 + 100.64.72.169 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch","FireEye Endpoint Security (HX Series)"] + + + INCIDENT_LINK + 1685772546 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25512200-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25512200-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcadf952b65006d9766308802a29a423a8ba48e7 --- /dev/null +++ b/graph/incidents_graphml/2/2553c350-05b5-11ee-9e30-fd3f69b84945.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.219 + 100.64.70.219 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.45.252 + 100.64.45.252 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686198606 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2553c350-05b5-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198606 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2553c350-05b5-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198606 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2553c350-05b5-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198606 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2553c350-05b5-11ee-9e30-fd3f69b84945 + + + diff --git a/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6d9cce1bd3e636fcdaf184d22aa085d62a99cfb --- /dev/null +++ b/graph/incidents_graphml/2/255763c0-0e2f-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.82 + 100.64.30.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.62.9 + 100.64.62.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.43 + 100.64.80.43 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130614 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 255763c0-0e2f-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d43e32759b75e2dba9c32cd0873b837c4ed51690 --- /dev/null +++ b/graph/incidents_graphml/2/255bf570-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.136 + 100.64.14.136 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519413 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 255bf570-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12c9b854af72225b87c6212044c9d4c033d47127 --- /dev/null +++ b/graph/incidents_graphml/2/255fbc70-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319565 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 255fbc70-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1362e9627edf6d58195ea264759916f8992e1ac --- /dev/null +++ b/graph/incidents_graphml/2/25669e20-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610660 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25669e20-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4406743fcaac4b6bef32d7d601f38fa83bd9c5a3 --- /dev/null +++ b/graph/incidents_graphml/2/25670df0-3937-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.2 + 100.64.7.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25670df0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25670df0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25670df0-3937-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08ec868afbcd4789683ad08e42601d5a7076e2a1 --- /dev/null +++ b/graph/incidents_graphml/2/25687a90-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.21.56 + 100.64.21.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685772546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25687a90-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25687a90-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25687a90-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25687a90-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87e59095493e027ea2988f4107a2a6ea61e74d2f --- /dev/null +++ b/graph/incidents_graphml/2/2577b140-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.42 + 100.64.9.42 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319565 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2577b140-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..839c7455d9d15f93c14ce9fc596788394a3c432e --- /dev/null +++ b/graph/incidents_graphml/2/25780ea0-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.55 + 100.64.8.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434020 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25780ea0-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f3dbc80760001aba913d5564adef8b86255fb36 --- /dev/null +++ b/graph/incidents_graphml/2/257a9b50-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 257a9b50-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2612baef2f2e8c40b34352af540e37fabcc55ee --- /dev/null +++ b/graph/incidents_graphml/2/25808610-9999-11ee-9c88-85e8bec5492c.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.118 + 100.64.33.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.246 + 100.64.51.246 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.91 + 100.64.10.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.162 + 100.64.19.162 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.49 + 100.64.14.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.218 + 100.64.52.218 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.196 + 100.64.7.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.219 + 100.64.52.219 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.220 + 100.64.52.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.221 + 100.64.52.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.222 + 100.64.52.222 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.223 + 100.64.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25808610-9999-11ee-9c88-85e8bec5492c + + + diff --git a/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79fa5799d0639ccadabd895544d823f851254d19 --- /dev/null +++ b/graph/incidents_graphml/2/2582a2a0-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.111 + 100.64.74.111 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.64.106 + 100.64.64.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.19.223 + USER-0015-1406.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.112 + 100.64.74.112 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + USER-0015-1615.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.113 + USER-0015-1675.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.114 + 100.64.74.114 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.115 + USER-0015-1676.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2582a2a0-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71cad329ec58bbc8aeac1297ef213521235100b6 --- /dev/null +++ b/graph/incidents_graphml/2/25840d50-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.42 + 100.64.9.42 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319566 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25840d50-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22fb5521d7ce666cb2c84d7f1b162bda5040a000 --- /dev/null +++ b/graph/incidents_graphml/2/258b6f90-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.57 + 100.64.8.57 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 258b6f90-0f9a-11ef-ba57-a7da65bcbce4 + + + INCIDENT_LINK + 1715434020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 258b6f90-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e5cb73d7bdf47f05bba042b117826c0e8b8fb4b --- /dev/null +++ b/graph/incidents_graphml/2/258fa610-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 258fa610-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94ac8698cb238bd6e9a1e58b6ba26401642d8628 --- /dev/null +++ b/graph/incidents_graphml/2/2592b1d0-3937-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.64 + 100.64.41.64 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.111 + 100.64.22.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.39 + 100.64.2.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.65 + 100.64.41.65 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.91 + 100.64.15.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.66 + 100.64.41.66 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2592b1d0-3937-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbde43b9bb82161658b05d64a493dfb4eacc9f88 --- /dev/null +++ b/graph/incidents_graphml/2/2593a190-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610661 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2593a190-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6588e4be9dcbd70b2b28b557562fee317038d786 --- /dev/null +++ b/graph/incidents_graphml/2/259a4950-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.116 + USER-0015-1677.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + USER-0015-1622.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.117 + USER-0015-1678.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259a4950-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcdf50c0eb133accac5c190e3b9495b153cf6aa0 --- /dev/null +++ b/graph/incidents_graphml/2/259b4e10-0f9a-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.57 + 100.64.8.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715434020 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 259b4e10-0f9a-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86bfc513ced5458283f3c5b8ac1e3c665baec755 --- /dev/null +++ b/graph/incidents_graphml/2/259c0220-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319566 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 259c0220-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae1256e1bc1829db992e6acd8231901a7893061b --- /dev/null +++ b/graph/incidents_graphml/2/25aa5a00-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.46 + 100.64.9.46 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 25aa5a00-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97e8977b67dc55999927e9dee1a7783998a151c6 --- /dev/null +++ b/graph/incidents_graphml/2/25b1a660-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.30 + 100.64.19.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363742 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 25b1a660-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0a510930944d1d3ced5bf605c1468169ae4cacd --- /dev/null +++ b/graph/incidents_graphml/2/25b33fb0-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.27 + 100.64.25.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211077 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25b33fb0-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcbf0576b8f922bc4e05581b451aa6c06739e91c --- /dev/null +++ b/graph/incidents_graphml/2/25b8b1e0-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.46 + 100.64.9.46 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 25b8b1e0-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..211f90fb8b023f6fba0b97a2f5e7504915e76725 --- /dev/null +++ b/graph/incidents_graphml/2/25ba9ef0-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.93 + 100.64.35.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25ba9ef0-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml b/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51bf2abea000f0a48c806620e990a496eca3ec88 --- /dev/null +++ b/graph/incidents_graphml/2/25c15dd0-aaeb-11ee-8329-a9b1c800624c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.30 + 100.64.19.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704363742 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25c15dd0-aaeb-11ee-8329-a9b1c800624c + + + diff --git a/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6651881492a0d022ee61214db15e220f14a0894 --- /dev/null +++ b/graph/incidents_graphml/2/25cd7e70-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.27 + 100.64.25.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211077 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25cd7e70-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e90426af7cce7051f4d007e7a620334c048a54a0 --- /dev/null +++ b/graph/incidents_graphml/2/25d6ebd0-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.46 + 100.64.59.46 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 25d6ebd0-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48ed35826571f1eaa351c7593bf6e6104773bcf4 --- /dev/null +++ b/graph/incidents_graphml/2/25ea9ae0-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.48 + 100.64.59.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742454 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 25ea9ae0-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e1bf78192f2deb2d09db32a2b2ee291cdb98adf --- /dev/null +++ b/graph/incidents_graphml/2/25f1da60-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.128 + 100.64.54.128 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721042 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 25f1da60-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5adb9dfd4d696ce90f6a70f9d74db502df254a8d --- /dev/null +++ b/graph/incidents_graphml/2/26022470-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.215 + 100.64.19.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705649 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 26022470-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4448003a0796a109c8be487cb3ae7351c44269d0 --- /dev/null +++ b/graph/incidents_graphml/2/26033af0-5e4e-11ee-8592-6935d79f5b6b.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.229 + 100.64.35.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.230 + 100.64.35.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.231 + 100.64.35.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.232 + 100.64.35.232 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.233 + 100.64.35.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.234 + 100.64.35.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.20 + 100.64.23.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.107 + 100.64.19.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.235 + 100.64.35.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.236 + 100.64.35.236 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.237 + 100.64.35.237 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.238 + 100.64.35.238 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.239 + 100.64.35.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.240 + 100.64.35.240 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.241 + 100.64.35.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.242 + 100.64.35.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.243 + 100.64.35.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.244 + 100.64.35.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940023 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26033af0-5e4e-11ee-8592-6935d79f5b6b + + + diff --git a/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml b/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33f709a4aeaed7a113d1dc4a6b4cbd5a4b482146 --- /dev/null +++ b/graph/incidents_graphml/2/26109070-706d-11ee-bf4b-5f6b66a218e8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1697932458 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26109070-706d-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932458 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26109070-706d-11ee-bf4b-5f6b66a218e8 + + + diff --git a/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3ec4e0f0d091d795aee5e9ddfa032f79d96a3fb --- /dev/null +++ b/graph/incidents_graphml/2/26141be0-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 26141be0-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml b/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d38970c8357734e04fb65cb6ebccb9843518ec4a --- /dev/null +++ b/graph/incidents_graphml/2/261ce1c0-6683-11ee-91f9-f367d99d3c80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.181 + 100.64.65.181 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696842396 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 261ce1c0-6683-11ee-91f9-f367d99d3c80 + + + diff --git a/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..390cbc03b1febd9224f60da542e2dbc07fa64d0b --- /dev/null +++ b/graph/incidents_graphml/2/2623b560-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.142 + 100.64.14.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2623b560-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8d659c2467ed9c93912204c6799ba36d9736245 --- /dev/null +++ b/graph/incidents_graphml/2/26240450-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705650 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26240450-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24b1446b42bfc56670c420ad073f08c576393ea3 --- /dev/null +++ b/graph/incidents_graphml/2/2634cd30-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705650 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2634cd30-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d91ca549d8f5ba33b353a0d92748885b528f4a94 --- /dev/null +++ b/graph/incidents_graphml/2/263d4ec0-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.50 + 100.64.59.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 263d4ec0-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c0954e4f1ecf3da6bfda90d1e92b88cfa809c85 --- /dev/null +++ b/graph/incidents_graphml/2/263f00a0-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.106 + 100.64.17.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.40 + 100.64.21.40 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529930 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 263f00a0-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d0d50c59683d190e4bc3ef05e5a08668ebeab7d --- /dev/null +++ b/graph/incidents_graphml/2/26459610-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705650 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26459610-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e26f2b2c67d73a464e8a0a30c4a70cbb0b0fe250 --- /dev/null +++ b/graph/incidents_graphml/2/2647b400-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.236 + 100.64.79.236 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1669680593 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2647b400-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680593 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2647b400-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1c8d0084e5fc42261e708b4166dbf6dc87d79b2 --- /dev/null +++ b/graph/incidents_graphml/2/264e3620-fa6a-11ec-afb6-b9a2c990c2ed.graphml @@ -0,0 +1,767 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.206 + 100.64.78.206 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.207 + USER-0015-1794.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.208 + 100.64.78.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.209 + USER-0015-1795.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.43.63 + 100.64.43.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.210 + 100.64.78.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.211 + 100.64.78.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.212 + USER-0015-1796.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.213 + 100.64.78.213 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.27.178 + 100.64.27.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.252 + 100.64.74.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.79 + 100.64.75.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.214 + USER-0015-1797.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.215 + 100.64.78.215 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.216 + 100.64.78.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.217 + 100.64.78.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.218 + 100.64.78.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.219 + 100.64.78.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 264e3620-fa6a-11ec-afb6-b9a2c990c2ed + + + diff --git a/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6167804505ccc5947b1779b61cdb4913b3275341 --- /dev/null +++ b/graph/incidents_graphml/2/2651e830-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.50 + 100.64.59.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2651e830-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55363f186a7e43b238c78c19a8f0f2cf594b4696 --- /dev/null +++ b/graph/incidents_graphml/2/2654a030-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.134 + 100.64.48.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622390 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2654a030-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..700bd9c89ced3d6bafff6e37b46e3a8acd5751dd --- /dev/null +++ b/graph/incidents_graphml/2/26555c90-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.149 + 100.64.11.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013731 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26555c90-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a5e72ea590bd1bdcf210151bba3129bd58737ab --- /dev/null +++ b/graph/incidents_graphml/2/265db1f0-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705650 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 265db1f0-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..303e7b5944b8e1aac0b8cc7681ca9d2628118f52 --- /dev/null +++ b/graph/incidents_graphml/2/265eb970-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.52 + 100.64.59.52 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 265eb970-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dd56e11a2739be62c7b4830e508cbd33224cdec --- /dev/null +++ b/graph/incidents_graphml/2/2665d750-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.149 + 100.64.11.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013731 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2665d750-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7df02aa342d2917d66f28a679b25e426f2a81d7 --- /dev/null +++ b/graph/incidents_graphml/2/266bb1c0-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.52 + 100.64.59.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 266bb1c0-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1aee13a6db1d79afe43eb821220fdb01c950e865 --- /dev/null +++ b/graph/incidents_graphml/2/266da670-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.134 + 100.64.48.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622390 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 266da670-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29b8c2a46c8f3f6f493b75e440e498bbae5372eb --- /dev/null +++ b/graph/incidents_graphml/2/26797a60-3f00-11ef-a3c1-8be1e2d87500.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.234 + 100.64.44.234 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.25.5.56 + 10.25.5.56 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720645535 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26797a60-3f00-11ef-a3c1-8be1e2d87500 + + + INCIDENT_LINK + 1720645535 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26797a60-3f00-11ef-a3c1-8be1e2d87500 + + + diff --git a/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aeb21188be46bf4352ec5ae559a44446ac3724d4 --- /dev/null +++ b/graph/incidents_graphml/2/267d7400-5e4e-11ee-8592-6935d79f5b6b.graphml @@ -0,0 +1,395 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.5 + 100.64.36.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.6 + 100.64.36.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.193 + 100.64.25.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.7 + 100.64.36.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.205 + 100.64.9.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 267d7400-5e4e-11ee-8592-6935d79f5b6b + + + diff --git a/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81d9866d9cc46448d0f1b55b3bafc90f35a5b393 --- /dev/null +++ b/graph/incidents_graphml/2/2684d320-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.11 + 100.64.35.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2684d320-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml b/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b0435547f68daf4750f37bb0a32b0dd1ea8e8e7 --- /dev/null +++ b/graph/incidents_graphml/2/2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c.graphml @@ -0,0 +1,735 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.185 + USER-0015-1531.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.69.186 + 100.64.69.186 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.48.140 + USER-0015-1532.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.187 + 100.64.69.187 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.11 + HOST-12183 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.41.204 + 100.64.41.204 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.76 + USER-0015-1533.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.48.7 + 100.64.48.7 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.224 + 100.64.68.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + INCIDENT_LINK + 1689025126 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2686d8b0-1f6a-11ee-86d7-9d80e15c5f0c + + + diff --git a/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdfbb1aad72b556d933787483b41506f61f98afc --- /dev/null +++ b/graph/incidents_graphml/2/268b8c70-3d37-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.211.94 + 172.21.211.94 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.91.67 + 100.64.91.67 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720449255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 268b8c70-3d37-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 268b8c70-3d37-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml b/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..159a0f4b9e87b0f72ad1343f22795db3281c666d --- /dev/null +++ b/graph/incidents_graphml/2/268d6a90-5c82-11ee-b726-6981dbb03ad6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.54 + 100.64.59.54 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695742455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 268d6a90-5c82-11ee-b726-6981dbb03ad6 + + + diff --git a/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..812306a93cb2818a82c2a862c2616e15ac49f130 --- /dev/null +++ b/graph/incidents_graphml/2/2691d850-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237831 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2691d850-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8fc6836b138cb4c6c17a21a8dc6d222042ef45c --- /dev/null +++ b/graph/incidents_graphml/2/2694ffc0-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.11 + 100.64.35.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2694ffc0-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml b/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..138f5562ae3a17f280f30539acf4533789e40914 --- /dev/null +++ b/graph/incidents_graphml/2/26968ec0-6ada-11ee-947e-5d70e209d5c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.128 + 100.64.48.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697319567 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26968ec0-6ada-11ee-947e-5d70e209d5c7 + + + diff --git a/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05106649e5f8b74638f7474dbddf9348111aa7e6 --- /dev/null +++ b/graph/incidents_graphml/2/26a0cc70-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237831 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 26a0cc70-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..895bee1eaab3a7007b99d4adf7168fbca2c481be --- /dev/null +++ b/graph/incidents_graphml/2/26b47b80-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.230 + 100.64.49.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237832 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 26b47b80-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92626ce1e878959157228023ecd8c774b6e1b2e7 --- /dev/null +++ b/graph/incidents_graphml/2/26b843e0-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.215 + 100.64.54.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 26b843e0-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..601938bd754eb54c49b4c95050afa2186fc49f2a --- /dev/null +++ b/graph/incidents_graphml/2/26c62690-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.254 + 100.64.13.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575381 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26c62690-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e9e45e434318f715116a5010fe0d76dd4b1e91f --- /dev/null +++ b/graph/incidents_graphml/2/26d31840-872d-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.141.136.106 + 10.141.136.106 + ["Exploiting Host"] + 0.7890625 + ["Precinct","AWS VPC Security","Windows Logs","Windows Active Directory"] + + + HOST + 192.0.2.120 + 192.0.2.120 + ["Exploiting Target"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 10.222.184.83 + 10.222.184.83 + ["Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672286351 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26d31840-872d-11ed-bb4c-dd95bc70531e + + + INCIDENT_LINK + 1672286351 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26d31840-872d-11ed-bb4c-dd95bc70531e + + + INCIDENT_LINK + 1672286351 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26d31840-872d-11ed-bb4c-dd95bc70531e + + + INCIDENT_LINK + 1672286351 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 26d31840-872d-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9adfbd8b2f1bce10ab680dc6234a2300f4f638a8 --- /dev/null +++ b/graph/incidents_graphml/2/26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.254 + 100.64.13.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575382 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 26d9fcb0-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd2ba095ab7c4b49e45ac096a63376bc77c3f685 --- /dev/null +++ b/graph/incidents_graphml/2/26e4d000-a7f1-11ed-af31-070b715d9bbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.161.37 + 192.168.161.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.53 + 100.64.88.53 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675888969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26e4d000-a7f1-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26e4d000-a7f1-11ed-af31-070b715d9bbb + + + diff --git a/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30961917affe974fb0abf75c01acc11f46448fac --- /dev/null +++ b/graph/incidents_graphml/2/26e75450-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.219 + 100.64.19.219 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26e75450-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26eb7f30ed03eb99c4d104a5d74dd3d3233153c8 --- /dev/null +++ b/graph/incidents_graphml/2/26e97730-928e-11ee-92fb-e74bdedb3c0b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.121 + 100.64.69.121 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1701684973 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26e97730-928e-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684973 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26e97730-928e-11ee-92fb-e74bdedb3c0b + + + diff --git a/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbb9eeb95b8b87c283d5b79a5d0eb412505c73fc --- /dev/null +++ b/graph/incidents_graphml/2/26f15d70-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.232 + 100.64.49.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237832 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 26f15d70-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a8dedaa474db6b78faf0b67b51551d8bf302f2a --- /dev/null +++ b/graph/incidents_graphml/2/26f7f620-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.219 + 100.64.19.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705651 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 26f7f620-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93b5ce69084c38275716ffdf698dbdb6044478a4 --- /dev/null +++ b/graph/incidents_graphml/2/27002a80-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.232 + 100.64.49.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27002a80-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ca1a5993771ba4cbf36d9552f8756a5129730df --- /dev/null +++ b/graph/incidents_graphml/2/27017110-5e4e-11ee-8592-6935d79f5b6b.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.12 + 100.64.36.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.13 + 100.64.36.13 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.14 + 100.64.36.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.15 + 100.64.36.15 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.200 + 100.64.5.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.5 + 100.64.36.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.6 + 100.64.36.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.193 + 100.64.25.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.7 + 100.64.36.7 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.205 + 100.64.9.205 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.16 + 100.64.36.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.17 + 100.64.36.17 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.163 + 100.64.9.163 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940025 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27017110-5e4e-11ee-8592-6935d79f5b6b + + + diff --git a/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74b9c2c1f84d1ba06944548fff73b255bb7f937b --- /dev/null +++ b/graph/incidents_graphml/2/27038e10-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431300 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27038e10-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c464f199626dc1004ae562236e8ea0c9d1e21786 --- /dev/null +++ b/graph/incidents_graphml/2/270a7850-fcd3-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.127 + 100.64.13.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685221934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 270a7850-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 270a7850-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 270a7850-fcd3-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml new file mode 100644 index 0000000000000000000000000000000000000000..449c1739867d603e55b31979a52c628c6df1ad72 --- /dev/null +++ b/graph/incidents_graphml/2/270b1ad0-05b6-11ee-9e30-fd3f69b84945.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.224 + 100.64.68.224 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.746875 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.18.51 + 100.64.18.51 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.224 + 100.64.70.224 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686199039 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 270b1ad0-05b6-11ee-9e30-fd3f69b84945 + + + diff --git a/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59bfad1e6bf1015f8fa14d358ae4d69ba09a3b7c --- /dev/null +++ b/graph/incidents_graphml/2/271b2480-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.136 + 100.64.48.136 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622391 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 271b2480-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..755f117579fe993716119665d53901d8171e0472 --- /dev/null +++ b/graph/incidents_graphml/2/27203dd0-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27203dd0-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66a0ab9a4f7b7fb483c1e260db9aade13be16a24 --- /dev/null +++ b/graph/incidents_graphml/2/27263210-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27263210-5314-11ee-bb93-954a0464a100 + + + INCIDENT_LINK + 1694705651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27263210-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml b/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b60074c33799989d7317e07c0f32878af2c0aae1 --- /dev/null +++ b/graph/incidents_graphml/2/2736faf0-5314-11ee-bb93-954a0464a100.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694705651 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2736faf0-5314-11ee-bb93-954a0464a100 + + + diff --git a/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d01149bedcd822053660a25302b0f0841eef433c --- /dev/null +++ b/graph/incidents_graphml/2/2738aea0-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.82 + 100.64.40.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2738aea0-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..987156dd48869a24844bee1b8c37759a9c8c3203 --- /dev/null +++ b/graph/incidents_graphml/2/2743d700-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.95 + 100.64.35.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2743d700-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed8ec6be775a16a68151de4eff59c0d62bdf9ac0 --- /dev/null +++ b/graph/incidents_graphml/2/27453cf0-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.13 + 100.64.35.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.14 + 100.64.35.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.15 + 100.64.35.15 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.16 + 100.64.35.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.223 + 100.64.27.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.17 + 100.64.35.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.9 + 100.64.22.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.18 + 100.64.35.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.19 + 100.64.35.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.214 + 100.64.10.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.20 + 100.64.35.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.21 + 100.64.35.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.22 + 100.64.35.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.23 + 100.64.35.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.24 + 100.64.35.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.25 + 100.64.35.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.26 + 100.64.35.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27453cf0-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d46c284ca2433432e12dda37ac836a5ba8705b2b --- /dev/null +++ b/graph/incidents_graphml/2/274949a0-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.44 + 100.64.51.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 274949a0-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb63fcfb6e09db6714cbcfc4883d298545b4ee38 --- /dev/null +++ b/graph/incidents_graphml/2/274faa10-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.239 + 100.64.13.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 274faa10-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2053c90fe5855a233f2e623ed7c04fa14667da41 --- /dev/null +++ b/graph/incidents_graphml/2/27535080-2a82-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.223 + 100.64.86.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27535080-2a82-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40a35c7908fd64562bc24a8a166bee044a70b0f5 --- /dev/null +++ b/graph/incidents_graphml/2/2754e140-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.171 + 100.64.72.171 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.172 + 100.64.72.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.38.99 + 100.64.38.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.17.105 + 100.64.17.105 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.10.104 + 100.64.10.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2754e140-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6536ecf3ccded53dea21f44d7f54d40f9405110d --- /dev/null +++ b/graph/incidents_graphml/2/27590cb0-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.95 + 100.64.35.95 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723240 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27590cb0-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62f9a648679de3393719f1f198475938e9b5809f --- /dev/null +++ b/graph/incidents_graphml/2/27604f10-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.200 + 100.64.36.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27604f10-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a40542fe6f9e2566a66a715cf3fed4513d7aa213 --- /dev/null +++ b/graph/incidents_graphml/2/27641c70-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.239 + 100.64.13.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27641c70-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98c740094973bc516cf55b129f730f09b16598b2 --- /dev/null +++ b/graph/incidents_graphml/2/27697bd0-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.44 + 100.64.51.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 27697bd0-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c5d1fb00750a59fc529e4b94769bf9d67ccc9a1 --- /dev/null +++ b/graph/incidents_graphml/2/276b1e40-2a82-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.230 + 100.64.86.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 276b1e40-2a82-11ed-8698-87f85c8d72c2 + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 276b1e40-2a82-11ed-8698-87f85c8d72c2 + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 276b1e40-2a82-11ed-8698-87f85c8d72c2 + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 276b1e40-2a82-11ed-8698-87f85c8d72c2 + + + INCIDENT_LINK + 1662097401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 276b1e40-2a82-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d51d584e4c3e530bac09a93e58d5714f42e35039 --- /dev/null +++ b/graph/incidents_graphml/2/276f6a40-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.200 + 100.64.36.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 276f6a40-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a60d2485b073cd42d8e1ee64fb9e022e1b72fa5d --- /dev/null +++ b/graph/incidents_graphml/2/27704e60-2a82-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.230 + 100.64.86.230 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662097401 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27704e60-2a82-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml b/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d90efdf3e81faad3ef495244ef99305782db6fb --- /dev/null +++ b/graph/incidents_graphml/2/277a5010-e591-11ee-a357-23176ea63506.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.163 + 100.64.37.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.235 + 100.64.24.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.37.164 + 100.64.37.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + INCIDENT_LINK + 1710812209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 277a5010-e591-11ee-a357-23176ea63506 + + + diff --git a/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..343de9e35d6d27c026204faace947a8a169ff1e7 --- /dev/null +++ b/graph/incidents_graphml/2/27809810-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.120 + 100.64.81.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687646014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27809810-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27809810-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..568bd51fa9a3edac66473c495d5ebbe1b8fc0197 --- /dev/null +++ b/graph/incidents_graphml/2/2783b920-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.14 + 100.64.74.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.16 + USER-0015-1665.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397120 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2783b920-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2f425687b0f2b93f1d06c717603de200657d8e6 --- /dev/null +++ b/graph/incidents_graphml/2/27950090-085a-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.195 + USER-0015-2176.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.61.12 + 100.64.61.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.196 + 100.64.97.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.91 + USER-0015-2177.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636877 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27950090-085a-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..142633d06e24a48f51396d3205e78a39798a49f7 --- /dev/null +++ b/graph/incidents_graphml/2/27a01400-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.234 + 100.64.49.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27a01400-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a890b212e90ff3312afafa3c724f40b1f9473991 --- /dev/null +++ b/graph/incidents_graphml/2/27ad61b0-0e2f-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.44 + 100.64.80.44 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.45 + 100.64.80.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687130618 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27ad61b0-0e2f-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130618 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27ad61b0-0e2f-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cc67545b3b2209dc95b2bd12fd5552727764c57 --- /dev/null +++ b/graph/incidents_graphml/2/27ae47a0-2957-11ed-833a-955cfd42297d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.136.204 + 172.21.136.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.128 + 100.64.88.128 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661968982 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27ae47a0-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661968982 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27ae47a0-2957-11ed-833a-955cfd42297d + + + diff --git a/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb4fc25b5ecffaadbdf4c38a0de8d0d604bf624b --- /dev/null +++ b/graph/incidents_graphml/2/27b1ee50-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.234 + 100.64.49.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237833 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27b1ee50-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..869fb6004d41b0135a091509c3343a78de7effad --- /dev/null +++ b/graph/incidents_graphml/2/27b294a0-3552-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.150 + 100.64.95.150 + [] + 0.25 + ["Precinct","Barracuda WAF"] + + + INCIDENT_LINK + 1719581244 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 27b294a0-3552-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719581244 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 27b294a0-3552-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de03e3d3bfd4708d366a59aa1cea5d8beae660d9 --- /dev/null +++ b/graph/incidents_graphml/2/27be0300-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.37 + USER-0015-1666.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.17 + 100.64.74.17 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.18 + 100.64.74.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397121 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27be0300-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27be0300-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27be0300-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27be0300-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07ddc8511922e8a75f7446e7d93b5a1f69b87426 --- /dev/null +++ b/graph/incidents_graphml/2/27c15e60-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397121 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c15e60-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c15e60-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..480bf4fa4ccd7b597da37ba4dd5906d8266b3366 --- /dev/null +++ b/graph/incidents_graphml/2/27c94a20-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.144 + 100.64.51.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.145 + 100.64.51.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.197 + 100.64.29.197 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.146 + 100.64.51.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529933 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27c94a20-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13b0e474d84911b0fe3bcb094568e6a66cf708ed --- /dev/null +++ b/graph/incidents_graphml/2/27d53750-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.116 + 100.64.78.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658782975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d53750-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782975 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d53750-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02ed6003e04fe043c2cceb133aad674280a5f4c4 --- /dev/null +++ b/graph/incidents_graphml/2/27d7d060-c84f-11ed-9476-bf08a649e623.graphml @@ -0,0 +1,729 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.211.94 + 172.21.211.94 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.1.77 + 100.64.1.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.114 + 100.64.90.114 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Barracuda WAF"] + + + HOST + 100.64.87.77 + 100.64.87.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.252 + 100.64.86.252 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.3 + 100.64.87.3 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.162.189 + 172.18.162.189 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.115 + 100.64.90.115 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.116 + 100.64.90.116 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.117 + 100.64.90.117 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.22.39 + 172.26.22.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.118 + 100.64.90.118 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.119 + 100.64.90.119 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.67.109 + 172.24.67.109 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.20.133.1 + 172.20.133.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 172.29.225.232 + 172.29.225.232 + ["Exploiting Target"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447781 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27d7d060-c84f-11ed-9476-bf08a649e623 + + + diff --git a/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41530f577005c30f6a05e4e0b64d44d10127ecf7 --- /dev/null +++ b/graph/incidents_graphml/2/27d910d0-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27d910d0-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acc3eaf1e64bc2f6f1fb846341d05f2c0a35098f --- /dev/null +++ b/graph/incidents_graphml/2/27df2a90-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.209 + 100.64.50.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194551 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27df2a90-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be45cb2cd3bedb9e69e3f4482fce70a11fcdc200 --- /dev/null +++ b/graph/incidents_graphml/2/27e444f0-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330473 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27e444f0-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45b6a1b131a33f858c4bb442863b27b7878fc5c7 --- /dev/null +++ b/graph/incidents_graphml/2/27e858a0-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.181 + 100.64.62.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013733 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 27e858a0-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml b/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14d5079944c60168c4540a55fbab0941f1b9e3b2 --- /dev/null +++ b/graph/incidents_graphml/2/27eb74e0-7334-11ee-8dd4-3562adb8c958.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.236 + 100.64.49.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698237834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 27eb74e0-7334-11ee-8dd4-3562adb8c958 + + + diff --git a/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d7aa21cb177f3be2f0b910c8849e1d6d8c7db9a --- /dev/null +++ b/graph/incidents_graphml/2/27f068a0-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.209 + 100.64.50.209 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194551 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27f068a0-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c85caaecfcb5bee65b7093f78cd57efa759ee98b --- /dev/null +++ b/graph/incidents_graphml/2/27f105a0-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 27f105a0-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6de55df30c83fae08e1b7a5b2a5abea8318ef8f1 --- /dev/null +++ b/graph/incidents_graphml/2/27f40e70-5e4e-11ee-8592-6935d79f5b6b.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.22 + 100.64.36.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.23 + 100.64.36.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.24 + 100.64.36.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.25 + 100.64.36.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.251 + HOST-6674 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.26 + 100.64.36.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.207 + 100.64.10.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.27 + 100.64.36.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.28 + 100.64.36.28 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.29 + 100.64.36.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.30 + 100.64.36.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.210 + 100.64.11.210 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.151 + 100.64.22.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f40e70-5e4e-11ee-8592-6935d79f5b6b + + + diff --git a/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4a4a30bf6072f0c37eee1cb2ab12f1db2f4321d --- /dev/null +++ b/graph/incidents_graphml/2/27f50dd0-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.33 + 100.64.39.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 27f50dd0-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41d6ec9a4189eab81c9fca7fac22facc784a1d49 --- /dev/null +++ b/graph/incidents_graphml/2/27f602f0-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.19 + 100.64.74.19 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.20 + 100.64.74.20 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.21 + 100.64.74.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.22 + 100.64.74.22 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397121 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f602f0-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..111fad5dcc7d3b8d0baaadf7a809b394fdd6c1d2 --- /dev/null +++ b/graph/incidents_graphml/2/27f8bf80-05a9-11ef-8a49-f14dcee941df.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.92.100 + 100.64.92.100 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714340955 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f8bf80-05a9-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340955 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 27f8bf80-05a9-11ef-8a49-f14dcee941df + + + diff --git a/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3de32b6e53ebd4965142f5877ec7ab487d3f298c --- /dev/null +++ b/graph/incidents_graphml/2/28013240-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 28013240-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49debed82b8618ead4f5272944824b7956695a34 --- /dev/null +++ b/graph/incidents_graphml/2/28019d20-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.103 + 100.64.45.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 28019d20-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27813ce5bfa30288dd5619231062c490c7262e76 --- /dev/null +++ b/graph/incidents_graphml/2/2805afa0-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.33 + 100.64.39.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2805afa0-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml b/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0dfc2b237e89196ca501f0579f05e2874e5d872 --- /dev/null +++ b/graph/incidents_graphml/2/2806d320-5e4e-11ee-8592-6935d79f5b6b.graphml @@ -0,0 +1,797 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.42 + 100.64.36.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.43 + 100.64.36.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.44 + 100.64.36.44 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.239 + 100.64.35.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.45 + 100.64.36.45 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.46 + 100.64.36.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.87 + 100.64.23.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.196 + 100.64.20.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.47 + 100.64.36.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.38 + 100.64.10.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.48 + 100.64.36.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.10 + 100.64.6.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.49 + 100.64.36.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + INCIDENT_LINK + 1695940026 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2806d320-5e4e-11ee-8592-6935d79f5b6b + + + diff --git a/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfb674282bd0b5885f920650ca51421dce49a76d --- /dev/null +++ b/graph/incidents_graphml/2/2814ba40-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2814ba40-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml b/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b689d602e67ebb868f9ce91263227976e27484e7 --- /dev/null +++ b/graph/incidents_graphml/2/282048b0-2c34-11ee-9c67-95364ad06683.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.103 + 100.64.45.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690431301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 282048b0-2c34-11ee-9c67-95364ad06683 + + + diff --git a/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82e67f4546d28be04f2a2c27a5332c84d3ea8cc5 --- /dev/null +++ b/graph/incidents_graphml/2/2821d9a0-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2821d9a0-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c791821f2c372aa943d7dd2c1de326dd75798982 --- /dev/null +++ b/graph/incidents_graphml/2/28294ac0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.117 + 100.64.78.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658782976 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28294ac0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782976 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28294ac0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01198d4e11e9490353be14775a427cfd44f845e5 --- /dev/null +++ b/graph/incidents_graphml/2/282ad1d0-9eb8-11ee-9861-037a800baf91.graphml @@ -0,0 +1,517 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.156 + 100.64.90.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.19.16 + 100.64.19.16 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.157 + 100.64.90.157 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.158 + 100.64.90.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.159 + 100.64.90.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.77 + 100.64.22.77 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.160 + 100.64.90.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.81 + 100.64.7.81 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.161 + 100.64.90.161 + [] + 0.4375 + ["Precinct","Barracuda WAF"] + + + HOST + 100.64.90.162 + 100.64.90.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.145 + 100.64.37.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.163 + 100.64.90.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.129 + 100.64.63.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022428 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 282ad1d0-9eb8-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c35141b4a46d440c93fc07e672eba1c20f1032a4 --- /dev/null +++ b/graph/incidents_graphml/2/28303180-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28303180-899a-11ee-bba1-ef6459fc1a52 + + +