f15hb0wn commited on
Commit
4589004
·
verified ·
1 Parent(s): a28127d

Upload per-incident GraphML sharded batch 2/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml +185 -0
  2. graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml +63 -0
  3. graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml +77 -0
  4. graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml +63 -0
  5. graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml +113 -0
  6. graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
  7. graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml +365 -0
  8. graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml +63 -0
  9. graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml +63 -0
  10. graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml +77 -0
  11. graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
  12. graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml +63 -0
  13. graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
  14. graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
  15. graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  16. graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml +63 -0
  17. graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  18. graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml +77 -0
  19. graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml +77 -0
  20. graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml +157 -0
  21. graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml +151 -0
  22. graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml +401 -0
  23. graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml +77 -0
  24. graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml +207 -0
  25. graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
  26. graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml +387 -0
  27. graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml +63 -0
  28. graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml +113 -0
  29. graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml +63 -0
  30. graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml +77 -0
  31. graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
  32. graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml +63 -0
  33. graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml +63 -0
  34. graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
  35. graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
  36. graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
  37. graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
  38. graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml +157 -0
  39. graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
  40. graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml +63 -0
  41. graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml +63 -0
  42. graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
  43. graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
  44. graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
  45. graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
  46. graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml +63 -0
  47. graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml +769 -0
  48. graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml +77 -0
  49. graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml +113 -0
  50. graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml +63 -0
graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.29</data>
35
+ <data key="n_hostname">100.64.26.29</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ae87a073-28f4-11ef-9522-c9603914695c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="800bd130-305b-11ef-868f-737db7c2c108">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.26.30</data>
51
+ <data key="n_hostname">100.64.26.30</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="2873da81-2ffc-11ef-9d5b-81cb55900a52">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.26.31</data>
59
+ <data key="n_hostname">100.64.26.31</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="0dfe9d81-3136-11ef-acd3-f95ac44550fc">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.26.32</data>
67
+ <data key="n_hostname">100.64.26.32</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3" target="HOST-4729">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1719128931</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7890625</data>
77
+ <data key="e_suspicion_score">0.7890625</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-4729" target="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1719128931</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7890625</data>
91
+ <data key="e_suspicion_score">0.7890625</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
99
+ </edge>
100
+ <edge id="e3" source="800bd130-305b-11ef-868f-737db7c2c108" target="HOST-4729">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1719128931</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7890625</data>
105
+ <data key="e_suspicion_score">0.7890625</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-4729" target="800bd130-305b-11ef-868f-737db7c2c108">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1719128931</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7890625</data>
119
+ <data key="e_suspicion_score">0.7890625</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
127
+ </edge>
128
+ <edge id="e5" source="2873da81-2ffc-11ef-9d5b-81cb55900a52" target="HOST-4729">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1719128931</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7890625</data>
133
+ <data key="e_suspicion_score">0.7890625</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-4729" target="2873da81-2ffc-11ef-9d5b-81cb55900a52">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1719128931</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7890625</data>
147
+ <data key="e_suspicion_score">0.7890625</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
155
+ </edge>
156
+ <edge id="e7" source="0dfe9d81-3136-11ef-acd3-f95ac44550fc" target="HOST-4729">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1719128931</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.7890625</data>
161
+ <data key="e_suspicion_score">0.7890625</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-4729" target="0dfe9d81-3136-11ef-acd3-f95ac44550fc">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1719128931</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.7890625</data>
175
+ <data key="e_suspicion_score">0.7890625</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.72</data>
35
+ <data key="n_hostname">100.64.15.72</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.25.222.10</data>
43
+ <data key="n_hostname">172.25.222.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4751" target="HOST-2768">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697389954</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">082c33f0-6b7e-11ee-8294-3ff0afe5b786</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="57b0b435-062c-11ee-89b7-6745718ef904">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.37.13</data>
35
+ <data key="n_hostname">172.30.37.13</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.216</data>
43
+ <data key="n_hostname">100.64.95.216</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17203" target="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1716457891</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">082e2330-18ea-11ef-94b0-d3858c4ed3ac</data>
61
+ </edge>
62
+ <edge id="e2" source="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8" target="HOST-17203">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1716457891</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">082e2330-18ea-11ef-94b0-d3858c4ed3ac</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.222.10</data>
35
+ <data key="n_hostname">172.25.222.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c7686070-56e5-11ee-a8d5-c789d38e2e1f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.50</data>
43
+ <data key="n_hostname">100.64.52.50</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2768" target="HOST-9023">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695419423</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">082f5100-5992-11ee-8dda-91d41ca493d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6fb23292-0625-11ee-bb33-a72cfecde767">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.108</data>
35
+ <data key="n_hostname">100.64.68.108</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="3e1a77f7-0626-11ee-a31e-2bbd16ce2d59">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.65</data>
43
+ <data key="n_hostname">100.64.68.65</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
47
+ </node>
48
+ <node id="291b8ee5-901c-11ee-9dd1-eb8813af19a1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.8.174</data>
51
+ <data key="n_hostname">100.64.8.174</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.746875</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-11553" target="HOST-11454">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1701812052</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.746875</data>
61
+ <data key="e_suspicion_score">0.746875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-11454" target="HOST-11553">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1701812052</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.746875</data>
75
+ <data key="e_suspicion_score">0.746875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-11587" target="HOST-11454">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1701812052</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.746875</data>
89
+ <data key="e_suspicion_score">0.746875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-11454" target="HOST-11587">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1701812052</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.746875</data>
103
+ <data key="e_suspicion_score">0.746875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2cf6e855-90a0-11ee-90bb-49febada74fa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a0018d36-1613-11ee-b7c8-6153d80114e1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.36.194</data>
43
+ <data key="n_hostname">100.64.36.194</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17320" target="HOST-18630">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704249017</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml ADDED
@@ -0,0 +1,365 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="858628f1-0626-11ee-87d2-5909d78e9e20">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.41</data>
35
+ <data key="n_hostname">USER-0015-1222.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="34ebe7e2-062b-11ee-a5f2-b5ac1054298a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.11.13</data>
51
+ <data key="n_hostname">100.64.11.13</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="570228e0-0625-11ee-b19f-ed665a42340f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.10.148</data>
59
+ <data key="n_hostname">USER-0015-1223.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="5264fa76-214a-11ee-93ca-7bd3fbeea88b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.20.42</data>
67
+ <data key="n_hostname">100.64.20.42</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.20.43</data>
75
+ <data key="n_hostname">100.64.20.43</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="12b9a220-062b-11ee-a437-2bfcb70360ca">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.20.44</data>
83
+ <data key="n_hostname">100.64.20.44</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="83249b02-213d-11ee-95f5-9f5c925eda3c">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.20.45</data>
91
+ <data key="n_hostname">100.64.20.45</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.578125</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.20.46</data>
99
+ <data key="n_hostname">100.64.20.46</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="6e5f5980-0635-11ee-b1b1-97c6cb4541e5">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.20.47</data>
107
+ <data key="n_hostname">100.64.20.47</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <edge id="e1" source="858628f1-0626-11ee-87d2-5909d78e9e20" target="HOST-2750">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1689231234</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.841796875</data>
117
+ <data key="e_suspicion_score">0.841796875</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Disrupted</data>
124
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
125
+ </edge>
126
+ <edge id="e2" source="HOST-2750" target="858628f1-0626-11ee-87d2-5909d78e9e20">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1689231234</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.841796875</data>
131
+ <data key="e_suspicion_score">0.841796875</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Disrupted</data>
138
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
139
+ </edge>
140
+ <edge id="e3" source="HOST-2750" target="HOST-3251">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1689231234</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.841796875</data>
145
+ <data key="e_suspicion_score">0.841796875</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Disrupted</data>
152
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
153
+ </edge>
154
+ <edge id="e4" source="HOST-3251" target="HOST-2750">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1689231234</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.841796875</data>
159
+ <data key="e_suspicion_score">0.841796875</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Disrupted</data>
166
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
167
+ </edge>
168
+ <edge id="e5" source="570228e0-0625-11ee-b19f-ed665a42340f" target="HOST-2750">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1689231234</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.841796875</data>
173
+ <data key="e_suspicion_score">0.841796875</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
181
+ </edge>
182
+ <edge id="e6" source="HOST-2750" target="570228e0-0625-11ee-b19f-ed665a42340f">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1689231234</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.841796875</data>
187
+ <data key="e_suspicion_score">0.841796875</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
195
+ </edge>
196
+ <edge id="e7" source="5264fa76-214a-11ee-93ca-7bd3fbeea88b" target="HOST-2750">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1689231234</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.841796875</data>
201
+ <data key="e_suspicion_score">0.841796875</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
209
+ </edge>
210
+ <edge id="e8" source="HOST-2750" target="5264fa76-214a-11ee-93ca-7bd3fbeea88b">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1689231234</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.841796875</data>
215
+ <data key="e_suspicion_score">0.841796875</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
223
+ </edge>
224
+ <edge id="e9" source="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc" target="HOST-2750">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1689231234</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.841796875</data>
229
+ <data key="e_suspicion_score">0.841796875</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
237
+ </edge>
238
+ <edge id="e10" source="HOST-2750" target="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1689231234</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.841796875</data>
243
+ <data key="e_suspicion_score">0.841796875</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
251
+ </edge>
252
+ <edge id="e11" source="12b9a220-062b-11ee-a437-2bfcb70360ca" target="HOST-2750">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1689231234</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.841796875</data>
257
+ <data key="e_suspicion_score">0.841796875</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
265
+ </edge>
266
+ <edge id="e12" source="HOST-2750" target="12b9a220-062b-11ee-a437-2bfcb70360ca">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1689231234</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.841796875</data>
271
+ <data key="e_suspicion_score">0.841796875</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
279
+ </edge>
280
+ <edge id="e13" source="83249b02-213d-11ee-95f5-9f5c925eda3c" target="HOST-2750">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1689231234</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.841796875</data>
285
+ <data key="e_suspicion_score">0.841796875</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
293
+ </edge>
294
+ <edge id="e14" source="HOST-2750" target="83249b02-213d-11ee-95f5-9f5c925eda3c">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1689231234</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.841796875</data>
299
+ <data key="e_suspicion_score">0.841796875</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
307
+ </edge>
308
+ <edge id="e15" source="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1" target="HOST-2750">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1689231234</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.841796875</data>
313
+ <data key="e_suspicion_score">0.841796875</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
321
+ </edge>
322
+ <edge id="e16" source="HOST-2750" target="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1689231234</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.841796875</data>
327
+ <data key="e_suspicion_score">0.841796875</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
335
+ </edge>
336
+ <edge id="e17" source="6e5f5980-0635-11ee-b1b1-97c6cb4541e5" target="HOST-2750">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1689231234</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.841796875</data>
341
+ <data key="e_suspicion_score">0.841796875</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
349
+ </edge>
350
+ <edge id="e18" source="HOST-2750" target="6e5f5980-0635-11ee-b1b1-97c6cb4541e5">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1689231234</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.841796875</data>
355
+ <data key="e_suspicion_score">0.841796875</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
363
+ </edge>
364
+ </graph>
365
+ </graphml>
graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3ecc9210-51a2-11ee-9af1-99527e64b0b4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.93</data>
35
+ <data key="n_hostname">100.64.13.93</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3546" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699508232</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">0837e4a0-7ec2-11ee-a53e-810a167207be</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.222.10</data>
35
+ <data key="n_hostname">172.25.222.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.72</data>
43
+ <data key="n_hostname">100.64.15.72</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2768" target="HOST-4751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697389954</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">083a3db0-6b7e-11ee-8294-3ff0afe5b786</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3908f7f3-1747-11ee-abff-f708f77657c8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.8.190</data>
35
+ <data key="n_hostname">172.16.8.190</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="390cb440-0c8d-11ee-b099-e767072d48ce">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.74</data>
43
+ <data key="n_hostname">100.64.87.74</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="3908f7f3-1747-11ee-abff-f708f77657c8" target="390cb440-0c8d-11ee-b099-e767072d48ce">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1716457891</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">083e4fd0-18ea-11ef-94b0-d3858c4ed3ac</data>
61
+ </edge>
62
+ <edge id="e2" source="390cb440-0c8d-11ee-b099-e767072d48ce" target="3908f7f3-1747-11ee-abff-f708f77657c8">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1716457891</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">083e4fd0-18ea-11ef-94b0-d3858c4ed3ac</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7c42e850-19c7-11ee-9f6c-f9eff27c79a1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.94.142</data>
35
+ <data key="n_hostname">100.64.94.142</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8b36c395-0626-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.190.96.179</data>
43
+ <data key="n_hostname">100.64.6.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="7c42e850-19c7-11ee-9f6c-f9eff27c79a1" target="HOST-17429">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704249017</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08432290-a9e0-11ee-ad25-ed0dad3b42f5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ecc9210-51a2-11ee-9af1-99527e64b0b4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.93</data>
43
+ <data key="n_hostname">100.64.13.93</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-3546">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699508232</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">084fd970-7ec2-11ee-a53e-810a167207be</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8b36c395-0626-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.190.96.179</data>
35
+ <data key="n_hostname">100.64.6.51</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="7c42e850-19c7-11ee-9f6c-f9eff27c79a1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.94.142</data>
43
+ <data key="n_hostname">100.64.94.142</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17429" target="HOST-18631">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704249017</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">085523f0-a9e0-11ee-ad25-ed0dad3b42f5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ad3866b0-0937-11ee-af1f-f750a490ee43">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.51.164</data>
35
+ <data key="n_hostname">USER-0015-1393.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="ad3866b0-0937-11ee-af1f-f750a490ee43" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714851573</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">0865f080-0a4e-11ef-96bf-b7c516f33db0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="66e185e3-23b6-11ee-b26a-57571f2f7e79">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.40.248</data>
35
+ <data key="n_hostname">100.64.40.248</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.25.222.10</data>
43
+ <data key="n_hostname">172.25.222.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="66e185e3-23b6-11ee-b26a-57571f2f7e79" target="HOST-2768">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696343700</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">086fb180-61fa-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9afc9600-0627-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.24.50</data>
43
+ <data key="n_hostname">100.64.24.50</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-5036">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699285753</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">0870a540-7cbc-11ee-bf1f-2f975ac76263</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.222.10</data>
35
+ <data key="n_hostname">172.25.222.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="66e185e3-23b6-11ee-b26a-57571f2f7e79">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.40.248</data>
43
+ <data key="n_hostname">100.64.40.248</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2768" target="HOST-7343">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696343700</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">087e3070-61fa-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="73b38e02-00d3-11ed-a481-83c932d515b3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.129</data>
35
+ <data key="n_hostname">100.64.71.129</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="71d97a31-f738-11ec-b574-690aa31b920e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.130</data>
43
+ <data key="n_hostname">100.64.71.130</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="73b38e02-00d3-11ed-a481-83c932d515b3" target="71d97a31-f738-11ec-b574-690aa31b920e">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1658505468</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">088165f0-09d7-11ed-b518-5f11683c5c90</data>
61
+ </edge>
62
+ <edge id="e2" source="71d97a31-f738-11ec-b574-690aa31b920e" target="73b38e02-00d3-11ed-a481-83c932d515b3">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1658505468</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">088165f0-09d7-11ed-b518-5f11683c5c90</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="01d1ab75-41a9-11ed-a587-21753cf039e4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.255</data>
35
+ <data key="n_hostname">100.64.71.255</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.82.187</data>
43
+ <data key="n_hostname">100.64.82.187</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-15127" target="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1666301693</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08820df0-50bf-11ed-ba80-7f0cb65843d0</data>
61
+ </edge>
62
+ <edge id="e2" source="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4" target="HOST-15127">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1666301693</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">08820df0-50bf-11ed-ba80-7f0cb65843d0</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml ADDED
@@ -0,0 +1,157 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1e4755e0-063c-11ee-a276-59e1552b002b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.1</data>
35
+ <data key="n_hostname">100.64.17.1</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.27.202.53</data>
51
+ <data key="n_hostname">172.27.202.53</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="34776011-2899-11ee-b90e-4f4386b72167">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.59.113</data>
59
+ <data key="n_hostname">100.64.59.113</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.24.191.229</data>
67
+ <data key="n_hostname">172.24.191.229</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-4214" target="HOST-2858">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1694549693</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-2858" target="HOST-4214">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1694549693</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-2703" target="34776011-2899-11ee-b90e-4f4386b72167">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1694549693</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
113
+ </edge>
114
+ <edge id="e4" source="34776011-2899-11ee-b90e-4f4386b72167" target="HOST-2703">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1694549693</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
127
+ </edge>
128
+ <edge id="e5" source="HOST-2839" target="34776011-2899-11ee-b90e-4f4386b72167">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1694549693</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7</data>
133
+ <data key="e_suspicion_score">0.25</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Unprocessed</data>
140
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
141
+ </edge>
142
+ <edge id="e6" source="34776011-2899-11ee-b90e-4f4386b72167" target="HOST-2839">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1694549693</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7</data>
147
+ <data key="e_suspicion_score">0.25</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Unprocessed</data>
154
+ <data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
155
+ </edge>
156
+ </graph>
157
+ </graphml>
graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,151 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.40.250</data>
35
+ <data key="n_hostname">100.64.40.250</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.26.23.117</data>
51
+ <data key="n_hostname">172.26.23.117</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.18.38.152</data>
59
+ <data key="n_hostname">172.18.38.152</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.30.208.219</data>
67
+ <data key="n_hostname">172.30.208.219</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">172.31.6.172</data>
75
+ <data key="n_hostname">172.31.6.172</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2865">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1696343700</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7</data>
85
+ <data key="e_suspicion_score">0.25</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Unprocessed</data>
92
+ <data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
93
+ </edge>
94
+ <edge id="e2" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2824">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1696343700</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7</data>
99
+ <data key="e_suspicion_score">0.25</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Unprocessed</data>
106
+ <data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
107
+ </edge>
108
+ <edge id="e3" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2844">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1696343700</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7</data>
113
+ <data key="e_suspicion_score">0.25</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Unprocessed</data>
120
+ <data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
121
+ </edge>
122
+ <edge id="e4" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2823">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1696343700</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7</data>
127
+ <data key="e_suspicion_score">0.25</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Unprocessed</data>
134
+ <data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
135
+ </edge>
136
+ <edge id="e5" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2757">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1696343700</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7</data>
141
+ <data key="e_suspicion_score">0.25</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Unprocessed</data>
148
+ <data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
149
+ </edge>
150
+ </graph>
151
+ </graphml>
graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml ADDED
@@ -0,0 +1,401 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9af0b1a0-444d-11ee-8c04-a7821a99152a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.2.14</data>
35
+ <data key="n_hostname">100.64.2.14</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2da8f9c3-f115-11ee-af59-7d60d8b6957d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.13.54</data>
51
+ <data key="n_hostname">100.64.13.54</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="a9e88660-062c-11ee-b13b-a5c6fa88e64f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.55.98</data>
59
+ <data key="n_hostname">100.64.55.98</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="e3a25b82-cf47-11ee-b896-4f2f73d92d3f">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.13.3</data>
67
+ <data key="n_hostname">100.64.13.3</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="b51ebd00-1e33-11ee-999e-3bd400a500d1">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.56.225</data>
75
+ <data key="n_hostname">100.64.56.225</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="780ed611-0a25-11ee-a445-4dece889fe2b">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.20.181</data>
83
+ <data key="n_hostname">100.64.20.181</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="a4a28870-133e-11ef-9ba2-79c9fc9dbe31">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.56.226</data>
91
+ <data key="n_hostname">100.64.56.226</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.578125</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="c47c39a0-062b-11ee-9e9a-d982a9a53684">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.37.114</data>
99
+ <data key="n_hostname">100.64.37.114</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.7890625</data>
102
+ <data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
103
+ </node>
104
+ <node id="3fca0f91-3a22-11ee-b455-439f5edf4254">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.56.227</data>
107
+ <data key="n_hostname">100.64.56.227</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="20579840-063c-11ee-8b7c-f5f98afe5c7c">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.56.228</data>
115
+ <data key="n_hostname">100.64.56.228</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="9af0b1a0-444d-11ee-8c04-a7821a99152a" target="HOST-2839">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1715835121</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.9208984375</data>
125
+ <data key="e_suspicion_score">0.9208984375</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-2839" target="9af0b1a0-444d-11ee-8c04-a7821a99152a">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1715835121</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.9208984375</data>
139
+ <data key="e_suspicion_score">0.9208984375</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
147
+ </edge>
148
+ <edge id="e3" source="HOST-3524" target="HOST-2839">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1715835121</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.9208984375</data>
153
+ <data key="e_suspicion_score">0.9208984375</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
161
+ </edge>
162
+ <edge id="e4" source="HOST-2839" target="HOST-3524">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1715835121</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.9208984375</data>
167
+ <data key="e_suspicion_score">0.9208984375</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
175
+ </edge>
176
+ <edge id="e5" source="a9e88660-062c-11ee-b13b-a5c6fa88e64f" target="HOST-2839">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1715835121</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.9208984375</data>
181
+ <data key="e_suspicion_score">0.9208984375</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-2839" target="a9e88660-062c-11ee-b13b-a5c6fa88e64f">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1715835121</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.9208984375</data>
195
+ <data key="e_suspicion_score">0.9208984375</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
203
+ </edge>
204
+ <edge id="e7" source="e3a25b82-cf47-11ee-b896-4f2f73d92d3f" target="HOST-2839">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1715835121</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.9208984375</data>
209
+ <data key="e_suspicion_score">0.9208984375</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
217
+ </edge>
218
+ <edge id="e8" source="HOST-2839" target="e3a25b82-cf47-11ee-b896-4f2f73d92d3f">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1715835121</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.9208984375</data>
223
+ <data key="e_suspicion_score">0.9208984375</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
231
+ </edge>
232
+ <edge id="e9" source="b51ebd00-1e33-11ee-999e-3bd400a500d1" target="HOST-2839">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1715835121</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.9208984375</data>
237
+ <data key="e_suspicion_score">0.9208984375</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-2839" target="b51ebd00-1e33-11ee-999e-3bd400a500d1">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1715835121</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.9208984375</data>
251
+ <data key="e_suspicion_score">0.9208984375</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
259
+ </edge>
260
+ <edge id="e11" source="HOST-8053" target="HOST-2839">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1715835121</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.9208984375</data>
265
+ <data key="e_suspicion_score">0.9208984375</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-2839" target="HOST-8053">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1715835121</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.9208984375</data>
279
+ <data key="e_suspicion_score">0.9208984375</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
287
+ </edge>
288
+ <edge id="e13" source="a4a28870-133e-11ef-9ba2-79c9fc9dbe31" target="HOST-2839">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1715835121</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.9208984375</data>
293
+ <data key="e_suspicion_score">0.9208984375</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-2839" target="a4a28870-133e-11ef-9ba2-79c9fc9dbe31">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1715835121</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.9208984375</data>
307
+ <data key="e_suspicion_score">0.9208984375</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
315
+ </edge>
316
+ <edge id="e15" source="HOST-6863" target="HOST-2839">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1715835121</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.9208984375</data>
321
+ <data key="e_suspicion_score">0.9208984375</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-2839" target="HOST-6863">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1715835121</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.9208984375</data>
335
+ <data key="e_suspicion_score">0.9208984375</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
343
+ </edge>
344
+ <edge id="e17" source="3fca0f91-3a22-11ee-b455-439f5edf4254" target="HOST-2839">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1715835121</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.9208984375</data>
349
+ <data key="e_suspicion_score">0.9208984375</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
357
+ </edge>
358
+ <edge id="e18" source="HOST-2839" target="3fca0f91-3a22-11ee-b455-439f5edf4254">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1715835121</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.9208984375</data>
363
+ <data key="e_suspicion_score">0.9208984375</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
371
+ </edge>
372
+ <edge id="e19" source="20579840-063c-11ee-8b7c-f5f98afe5c7c" target="HOST-2839">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1715835121</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.9208984375</data>
377
+ <data key="e_suspicion_score">0.9208984375</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
385
+ </edge>
386
+ <edge id="e20" source="HOST-2839" target="20579840-063c-11ee-8b7c-f5f98afe5c7c">
387
+ <data key="e_type">INCIDENT_LINK</data>
388
+ <data key="e_timestamp">1715835121</data>
389
+ <data key="e_label_binary">malicious</data>
390
+ <data key="e_label_confidence">0.9208984375</data>
391
+ <data key="e_suspicion_score">0.9208984375</data>
392
+ <data key="e_mo_name">Data Theft</data>
393
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
394
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
395
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
396
+ <data key="e_lifecycle_stage">complete-mission</data>
397
+ <data key="e_disposition">Disrupted</data>
398
+ <data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
399
+ </edge>
400
+ </graph>
401
+ </graphml>
graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="46487040-ea92-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.32</data>
35
+ <data key="n_hostname">100.64.80.32</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="dbb54410-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.158</data>
43
+ <data key="n_hostname">100.64.1.158</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="46487040-ea92-11ec-90c7-eff83c975df3" target="HOST-14109">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655465490</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08a25fb0-ee31-11ec-9c18-c95a461c6308</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14109" target="46487040-ea92-11ec-90c7-eff83c975df3">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655465490</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">08a25fb0-ee31-11ec-9c18-c95a461c6308</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml ADDED
@@ -0,0 +1,207 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e7cfde40-ea91-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.73.106</data>
35
+ <data key="n_hostname">100.64.73.106</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="dd10dc70-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.147</data>
43
+ <data key="n_hostname">100.64.71.147</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="1716d5a0-ea92-11ec-abf7-619673fe2558">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.182</data>
51
+ <data key="n_hostname">100.64.76.182</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="e4efc8c0-ea91-11ec-abf7-619673fe2558">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.73.200</data>
59
+ <data key="n_hostname">USER-0015-1793.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="34281690-ea92-11ec-abf7-619673fe2558">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.71.124</data>
67
+ <data key="n_hostname">100.64.71.124</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="4df55010-ea92-11ec-90c7-eff83c975df3">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.2.213</data>
75
+ <data key="n_hostname">USER-0015-1421.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <edge id="e1" source="HOST-13299" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1655116309</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7</data>
85
+ <data key="e_suspicion_score">0.25</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Unprocessed</data>
92
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-14205" target="HOST-15019">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1655116309</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7</data>
99
+ <data key="e_suspicion_score">0.25</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Unprocessed</data>
106
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-15019" target="HOST-14205">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1655116309</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7</data>
113
+ <data key="e_suspicion_score">0.25</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Unprocessed</data>
120
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
121
+ </edge>
122
+ <edge id="e4" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="HOST-12694">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1655116309</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7</data>
127
+ <data key="e_suspicion_score">0.25</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Unprocessed</data>
134
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
135
+ </edge>
136
+ <edge id="e5" source="HOST-12694" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1655116309</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7</data>
141
+ <data key="e_suspicion_score">0.25</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Unprocessed</data>
148
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
149
+ </edge>
150
+ <edge id="e6" source="4df55010-ea92-11ec-90c7-eff83c975df3" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1655116309</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7</data>
155
+ <data key="e_suspicion_score">0.25</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Unprocessed</data>
162
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
163
+ </edge>
164
+ <edge id="e7" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="4df55010-ea92-11ec-90c7-eff83c975df3">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1655116309</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7</data>
169
+ <data key="e_suspicion_score">0.25</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Unprocessed</data>
176
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
177
+ </edge>
178
+ <edge id="e8" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="HOST-13299">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1655116309</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7</data>
183
+ <data key="e_suspicion_score">0.25</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Unprocessed</data>
190
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
191
+ </edge>
192
+ <edge id="e9" source="HOST-14205" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1655116309</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7</data>
197
+ <data key="e_suspicion_score">0.25</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Unprocessed</data>
204
+ <data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
205
+ </edge>
206
+ </graph>
207
+ </graphml>
graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a967e0f0-31ab-11ee-96a8-13610f689ebc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.50.121</data>
35
+ <data key="n_hostname">100.64.50.121</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8780" target="HOST-2834">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708379488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08b3a8b0-cf71-11ee-9f4f-f950118d6926</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml ADDED
@@ -0,0 +1,387 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ee8b8a92-2d75-11ee-abd3-9bc3af0e7df1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.239</data>
35
+ <data key="n_hostname">100.64.26.239</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.62.247</data>
51
+ <data key="n_hostname">100.64.62.247</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="54ffb372-2635-11ee-b528-33a166535f4a">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.62.248</data>
59
+ <data key="n_hostname">100.64.62.248</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.30.229.11</data>
67
+ <data key="n_hostname">172.30.229.11</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="3e12c124-2f36-11ee-b118-cd33c6868f95">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.62.249</data>
75
+ <data key="n_hostname">100.64.62.249</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="202b8de4-4403-11ee-8a41-2d95f07923e3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.62.250</data>
83
+ <data key="n_hostname">100.64.62.250</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="3c0a1912-0627-11ee-9882-3f47c834d49b">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.8.109</data>
91
+ <data key="n_hostname">100.64.8.109</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="c0b39d11-0624-11ee-9a0c-b9f8978d847e">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.7.230</data>
99
+ <data key="n_hostname">100.64.7.230</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="8f580111-0625-11ee-8860-f951c26910c1">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.35.196</data>
107
+ <data key="n_hostname">100.64.35.196</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="dada5cb0-062e-11ee-a1d3-93ab5e0cb06b">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.14.84</data>
115
+ <data key="n_hostname">100.64.14.84</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="HOST-5434" target="HOST-2748">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1693048602</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7</data>
125
+ <data key="e_suspicion_score">0.25</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Unprocessed</data>
132
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-2748" target="HOST-5434">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1693048602</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7</data>
139
+ <data key="e_suspicion_score">0.25</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Unprocessed</data>
146
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
147
+ </edge>
148
+ <edge id="e3" source="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8" target="HOST-2748">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1693048602</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.7</data>
153
+ <data key="e_suspicion_score">0.25</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Unprocessed</data>
160
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
161
+ </edge>
162
+ <edge id="e4" source="HOST-2748" target="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1693048602</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.7</data>
167
+ <data key="e_suspicion_score">0.25</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Unprocessed</data>
174
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
175
+ </edge>
176
+ <edge id="e5" source="54ffb372-2635-11ee-b528-33a166535f4a" target="HOST-2748">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1693048602</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.7</data>
181
+ <data key="e_suspicion_score">0.25</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Unprocessed</data>
188
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-2748" target="54ffb372-2635-11ee-b528-33a166535f4a">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1693048602</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.7</data>
195
+ <data key="e_suspicion_score">0.25</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Unprocessed</data>
202
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
203
+ </edge>
204
+ <edge id="e7" source="54ffb372-2635-11ee-b528-33a166535f4a" target="HOST-2750">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1693048602</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.7</data>
209
+ <data key="e_suspicion_score">0.25</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Unprocessed</data>
216
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
217
+ </edge>
218
+ <edge id="e8" source="3e12c124-2f36-11ee-b118-cd33c6868f95" target="HOST-2748">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1693048602</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.7</data>
223
+ <data key="e_suspicion_score">0.25</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Unprocessed</data>
230
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
231
+ </edge>
232
+ <edge id="e9" source="HOST-2748" target="3e12c124-2f36-11ee-b118-cd33c6868f95">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1693048602</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.7</data>
237
+ <data key="e_suspicion_score">0.25</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Unprocessed</data>
244
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
245
+ </edge>
246
+ <edge id="e10" source="202b8de4-4403-11ee-8a41-2d95f07923e3" target="HOST-2748">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1693048602</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.7</data>
251
+ <data key="e_suspicion_score">0.25</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Unprocessed</data>
258
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
259
+ </edge>
260
+ <edge id="e11" source="HOST-2748" target="202b8de4-4403-11ee-8a41-2d95f07923e3">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1693048602</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.7</data>
265
+ <data key="e_suspicion_score">0.25</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Unprocessed</data>
272
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-2891" target="HOST-2748">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1693048602</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.7</data>
279
+ <data key="e_suspicion_score">0.25</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Unprocessed</data>
286
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
287
+ </edge>
288
+ <edge id="e13" source="HOST-2748" target="HOST-2891">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1693048602</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.7</data>
293
+ <data key="e_suspicion_score">0.25</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Unprocessed</data>
300
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-2817" target="HOST-2748">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1693048602</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.7</data>
307
+ <data key="e_suspicion_score">0.25</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Unprocessed</data>
314
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
315
+ </edge>
316
+ <edge id="e15" source="HOST-2748" target="HOST-2817">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1693048602</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.7</data>
321
+ <data key="e_suspicion_score">0.25</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Unprocessed</data>
328
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-6629" target="HOST-2748">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1693048602</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.7</data>
335
+ <data key="e_suspicion_score">0.25</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Unprocessed</data>
342
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
343
+ </edge>
344
+ <edge id="e17" source="HOST-2748" target="HOST-6629">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1693048602</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.7</data>
349
+ <data key="e_suspicion_score">0.25</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Unprocessed</data>
356
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
357
+ </edge>
358
+ <edge id="e18" source="HOST-4935" target="HOST-2748">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1693048602</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.7</data>
363
+ <data key="e_suspicion_score">0.25</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Unprocessed</data>
370
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
371
+ </edge>
372
+ <edge id="e19" source="HOST-2748" target="HOST-4935">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1693048602</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.7</data>
377
+ <data key="e_suspicion_score">0.25</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Unprocessed</data>
384
+ <data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
385
+ </edge>
386
+ </graph>
387
+ </graphml>
graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="cedfd933-0624-11ee-b144-2b760827f5b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.32.192</data>
35
+ <data key="n_hostname">100.64.32.192</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6250" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694332797</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08b71a40-4fb0-11ee-bb6d-6beb4ab99de5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2dfcae90-0632-11ee-9292-037474792a78">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.44.200</data>
35
+ <data key="n_hostname">100.64.44.200</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.245</data>
43
+ <data key="n_hostname">100.64.76.245</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="791ad080-0643-11ee-93f4-159fa6734fa9">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.15.138</data>
51
+ <data key="n_hostname">100.64.15.138</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="2dfcae90-0632-11ee-9292-037474792a78" target="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1687085469</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
69
+ </edge>
70
+ <edge id="e2" source="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8" target="2dfcae90-0632-11ee-9292-037474792a78">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1687085469</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
83
+ </edge>
84
+ <edge id="e3" source="791ad080-0643-11ee-93f4-159fa6734fa9" target="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1687085469</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
97
+ </edge>
98
+ <edge id="e4" source="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8" target="791ad080-0643-11ee-93f4-159fa6734fa9">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1687085469</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="993480b2-f8b4-11ed-80b3-5f000bc2563f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.45.213</data>
35
+ <data key="n_hostname">100.64.45.213</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b64ce794-c822-11ed-93e7-73b4f1774f3f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="993480b2-f8b4-11ed-80b3-5f000bc2563f" target="HOST-2743">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685000692</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08bcb5c0-fad0-11ed-b0ec-2b4cf5491294</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3b0e5fb1-0642-11ee-93f4-159fa6734fa9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.50.40</data>
35
+ <data key="n_hostname">192.168.50.40</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="8f36ce61-062e-11ee-9d60-e7b9fbc351b9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.83.49</data>
43
+ <data key="n_hostname">100.64.83.49</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="3b0e5fb1-0642-11ee-93f4-159fa6734fa9" target="8f36ce61-062e-11ee-9d60-e7b9fbc351b9">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688041100</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08c128e0-1677-11ee-a523-a1913ea7dc39</data>
61
+ </edge>
62
+ <edge id="e2" source="8f36ce61-062e-11ee-9d60-e7b9fbc351b9" target="3b0e5fb1-0642-11ee-93f4-159fa6734fa9">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688041100</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">08c128e0-1677-11ee-a523-a1913ea7dc39</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a967e0f0-31ab-11ee-96a8-13610f689ebc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.50.121</data>
43
+ <data key="n_hostname">100.64.50.121</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="HOST-8780">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708379488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08c498a0-cf71-11ee-9f4f-f950118d6926</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="cedfd933-0624-11ee-b144-2b760827f5b0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.192</data>
43
+ <data key="n_hostname">100.64.32.192</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-6250">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694332797</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08c5c040-4fb0-11ee-bb6d-6beb4ab99de5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="290ae893-065d-11ee-8944-dfa0a5726503">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.25.125</data>
43
+ <data key="n_hostname">100.64.25.125</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-5228">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689980277</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08cbd1a0-281a-11ee-b06f-b17f5f626799</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="eb553d62-0626-11ee-a48a-ff0b3de2e266">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.23.45</data>
43
+ <data key="n_hostname">100.64.23.45</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2750" target="HOST-4898">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708379488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08d22d30-cf71-11ee-9f4f-f950118d6926</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">100.64.86.76</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="3e53b165-2d2b-11ee-8189-49ff8e53e7f4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.31.25</data>
43
+ <data key="n_hostname">100.64.31.25</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17156" target="3e53b165-2d2b-11ee-8189-49ff8e53e7f4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704249018</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08dcf190-a9e0-11ee-ad25-ed0dad3b42f5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.92.108</data>
35
+ <data key="n_hostname">100.64.92.108</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c" target="HOST-16902">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678001184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08e18730-bb27-11ed-b3d4-01a3306b45e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c7749390-053b-11ef-b786-db1e1a895879">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.51.166</data>
35
+ <data key="n_hostname">100.64.51.166</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="c7749390-053b-11ef-b786-db1e1a895879" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714851574</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08e3d310-0a4e-11ef-96bf-b7c516f33db0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml ADDED
@@ -0,0 +1,157 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5dcf6ab4-9c5d-11ee-97aa-57da93db24ea">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.125</data>
35
+ <data key="n_hostname">100.64.17.125</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.23</data>
43
+ <data key="n_hostname">100.64.68.23</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect"]</data>
47
+ </node>
48
+ <node id="84fc2d39-de16-11ee-b925-e79fb64e6ce3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.21.1</data>
51
+ <data key="n_hostname">100.64.21.1</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="c9c2af89-0625-11ee-9f36-61ae8743c399">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.68.10</data>
59
+ <data key="n_hostname">100.64.68.10</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
63
+ </node>
64
+ <node id="18e9a49f-df35-11ee-b282-49286df51aec">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.70.190</data>
67
+ <data key="n_hostname">100.64.70.190</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-12528" target="HOST-11393">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1710159752</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-11393" target="HOST-12528">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1710159752</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-12529" target="HOST-11380">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1710159752</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-11380" target="HOST-12529">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1710159752</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
127
+ </edge>
128
+ <edge id="e5" source="HOST-11380" target="HOST-12530">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1710159752</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7</data>
133
+ <data key="e_suspicion_score">0.25</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Unprocessed</data>
140
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-12530" target="HOST-11380">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1710159752</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7</data>
147
+ <data key="e_suspicion_score">0.25</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Unprocessed</data>
154
+ <data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
155
+ </edge>
156
+ </graph>
157
+ </graphml>
graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.108</data>
43
+ <data key="n_hostname">100.64.92.108</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16902" target="HOST-18299">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678001184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08e88c10-bb27-11ed-b3d4-01a3306b45e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b51090eb-1865-11ef-a876-673d6ce79e72">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.95.218</data>
35
+ <data key="n_hostname">100.64.95.218</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="b51090eb-1865-11ef-a876-673d6ce79e72" target="HOST-16999">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1716457892</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08e95ce0-18ea-11ef-94b0-d3858c4ed3ac</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da39c010-2f24-11ee-bea3-4b3cea480881">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.35.168</data>
35
+ <data key="n_hostname">100.64.35.168</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="da39c010-2f24-11ee-bea3-4b3cea480881" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696121222</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08ea8430-5ff4-11ee-a4ff-1bc46b312733</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.92.110</data>
35
+ <data key="n_hostname">100.64.92.110</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="99448930-9f02-11ed-a78c-3fd929c8fa44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">100.64.84.55</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c" target="HOST-17141">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678001184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08eaaef0-bb27-11ed-b3d4-01a3306b45e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="99448930-9f02-11ed-a78c-3fd929c8fa44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">100.64.84.55</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.110</data>
43
+ <data key="n_hostname">100.64.92.110</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17141" target="HOST-18300">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678001184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08ede340-bb27-11ed-b3d4-01a3306b45e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3ece5322-cb2d-11ee-9222-b5c91e8078aa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.50.123</data>
35
+ <data key="n_hostname">100.64.50.123</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="3ece5322-cb2d-11ee-9222-b5c91e8078aa" target="HOST-2834">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708379488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">08f23850-cf71-11ee-9f4f-f950118d6926</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c7749390-053b-11ef-b786-db1e1a895879">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.51.166</data>
43
+ <data key="n_hostname">100.64.51.166</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-8945">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714851574</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">08f670b0-0a4e-11ef-96bf-b7c516f33db0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="b51090eb-1865-11ef-a876-673d6ce79e72">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.218</data>
43
+ <data key="n_hostname">100.64.95.218</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="HOST-18907">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1716457892</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">090410d0-18ea-11ef-94b0-d3858c4ed3ac</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml ADDED
@@ -0,0 +1,769 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bb6b80e0-0627-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.106</data>
35
+ <data key="n_hostname">100.64.8.106</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="7abcf143-8ae9-11ee-94c6-013af54e9a5e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.8.107</data>
51
+ <data key="n_hostname">100.64.8.107</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.8.108</data>
59
+ <data key="n_hostname">100.64.8.108</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="3c0a1912-0627-11ee-9882-3f47c834d49b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.8.109</data>
67
+ <data key="n_hostname">100.64.8.109</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2029e470-062f-11ee-978b-f374a5593a56">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.8.110</data>
75
+ <data key="n_hostname">100.64.8.110</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.8.111</data>
83
+ <data key="n_hostname">100.64.8.111</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="fdb24763-0625-11ee-b19f-ed665a42340f">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.8.112</data>
91
+ <data key="n_hostname">100.64.8.112</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">172.23.168.229</data>
99
+ <data key="n_hostname">172.23.168.229</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="34f23c20-d3d1-11ee-897b-715784089999">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.8.113</data>
107
+ <data key="n_hostname">100.64.8.113</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="6a078403-0628-11ee-b35a-9d13f89576c6">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.8.114</data>
115
+ <data key="n_hostname">100.64.8.114</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">172.26.73.92</data>
123
+ <data key="n_hostname">172.26.73.92</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="e4bb2a53-39b1-11ee-871b-bd56e862d10c">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.8.115</data>
131
+ <data key="n_hostname">100.64.8.115</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">172.26.23.117</data>
139
+ <data key="n_hostname">172.26.23.117</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.8.116</data>
147
+ <data key="n_hostname">100.64.8.116</data>
148
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="058039f0-06b9-11ee-bd37-1b3b617bd6b0">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.8.117</data>
155
+ <data key="n_hostname">100.64.8.117</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="49fcd789-7c7c-11ee-88b1-abd3957241db">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.8.118</data>
163
+ <data key="n_hostname">100.64.8.118</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="b71af6f3-3a26-11ee-9a0f-3fd546fc2c4e">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.8.119</data>
171
+ <data key="n_hostname">100.64.8.119</data>
172
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.8.120</data>
179
+ <data key="n_hostname">100.64.8.120</data>
180
+ <data key="n_set_roles">["Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="713aaef0-2540-11ee-9ba1-a1104bd64ffa">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.8.121</data>
187
+ <data key="n_hostname">100.64.8.121</data>
188
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="f79d9e50-0626-11ee-8860-f951c26910c1">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.8.122</data>
195
+ <data key="n_hostname">100.64.8.122</data>
196
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="13dab800-0b59-11ee-bb77-15fea7d75891">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.8.123</data>
203
+ <data key="n_hostname">100.64.8.123</data>
204
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <edge id="e1" source="bb6b80e0-0627-11ee-bb6d-91e4d286acbc" target="HOST-2761">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1708870403</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.7</data>
213
+ <data key="e_suspicion_score">0.25</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Unprocessed</data>
220
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
221
+ </edge>
222
+ <edge id="e2" source="HOST-2761" target="bb6b80e0-0627-11ee-bb6d-91e4d286acbc">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1708870403</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.7</data>
227
+ <data key="e_suspicion_score">0.25</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Unprocessed</data>
234
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
235
+ </edge>
236
+ <edge id="e3" source="7abcf143-8ae9-11ee-94c6-013af54e9a5e" target="HOST-2761">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1708870403</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.7</data>
241
+ <data key="e_suspicion_score">0.25</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Unprocessed</data>
248
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
249
+ </edge>
250
+ <edge id="e4" source="HOST-2761" target="7abcf143-8ae9-11ee-94c6-013af54e9a5e">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1708870403</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.7</data>
255
+ <data key="e_suspicion_score">0.25</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Unprocessed</data>
262
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
263
+ </edge>
264
+ <edge id="e5" source="fb871871-98ed-11ee-bd7a-6d2409f4df1b" target="HOST-2761">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1708870403</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.7</data>
269
+ <data key="e_suspicion_score">0.25</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Unprocessed</data>
276
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
277
+ </edge>
278
+ <edge id="e6" source="HOST-2761" target="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1708870403</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.7</data>
283
+ <data key="e_suspicion_score">0.25</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Unprocessed</data>
290
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
291
+ </edge>
292
+ <edge id="e7" source="3c0a1912-0627-11ee-9882-3f47c834d49b" target="HOST-2761">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1708870403</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.7</data>
297
+ <data key="e_suspicion_score">0.25</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Unprocessed</data>
304
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
305
+ </edge>
306
+ <edge id="e8" source="HOST-2761" target="3c0a1912-0627-11ee-9882-3f47c834d49b">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1708870403</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.7</data>
311
+ <data key="e_suspicion_score">0.25</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Unprocessed</data>
318
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
319
+ </edge>
320
+ <edge id="e9" source="2029e470-062f-11ee-978b-f374a5593a56" target="HOST-2761">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1708870403</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.7</data>
325
+ <data key="e_suspicion_score">0.25</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Unprocessed</data>
332
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
333
+ </edge>
334
+ <edge id="e10" source="HOST-2761" target="2029e470-062f-11ee-978b-f374a5593a56">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1708870403</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.7</data>
339
+ <data key="e_suspicion_score">0.25</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Unprocessed</data>
346
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
347
+ </edge>
348
+ <edge id="e11" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2761">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1708870403</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.7</data>
353
+ <data key="e_suspicion_score">0.25</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Unprocessed</data>
360
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
361
+ </edge>
362
+ <edge id="e12" source="HOST-2761" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1708870403</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.7</data>
367
+ <data key="e_suspicion_score">0.25</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Unprocessed</data>
374
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
375
+ </edge>
376
+ <edge id="e13" source="fdb24763-0625-11ee-b19f-ed665a42340f" target="HOST-2865">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1708870403</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.7</data>
381
+ <data key="e_suspicion_score">0.25</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Unprocessed</data>
388
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
389
+ </edge>
390
+ <edge id="e14" source="HOST-2865" target="fdb24763-0625-11ee-b19f-ed665a42340f">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1708870403</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.7</data>
395
+ <data key="e_suspicion_score">0.25</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Unprocessed</data>
402
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
403
+ </edge>
404
+ <edge id="e15" source="34f23c20-d3d1-11ee-897b-715784089999" target="HOST-2865">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1708870403</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.7</data>
409
+ <data key="e_suspicion_score">0.25</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Unprocessed</data>
416
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
417
+ </edge>
418
+ <edge id="e16" source="HOST-2865" target="34f23c20-d3d1-11ee-897b-715784089999">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1708870403</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.7</data>
423
+ <data key="e_suspicion_score">0.25</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Unprocessed</data>
430
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
431
+ </edge>
432
+ <edge id="e17" source="6a078403-0628-11ee-b35a-9d13f89576c6" target="HOST-2865">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1708870403</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.7</data>
437
+ <data key="e_suspicion_score">0.25</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Unprocessed</data>
444
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
445
+ </edge>
446
+ <edge id="e18" source="HOST-2865" target="6a078403-0628-11ee-b35a-9d13f89576c6">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1708870403</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.7</data>
451
+ <data key="e_suspicion_score">0.25</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Unprocessed</data>
458
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
459
+ </edge>
460
+ <edge id="e19" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2865">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1708870403</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.7</data>
465
+ <data key="e_suspicion_score">0.25</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Unprocessed</data>
472
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
473
+ </edge>
474
+ <edge id="e20" source="HOST-2865" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1708870403</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.7</data>
479
+ <data key="e_suspicion_score">0.25</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Unprocessed</data>
486
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
487
+ </edge>
488
+ <edge id="e21" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2724">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1708870403</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.7</data>
493
+ <data key="e_suspicion_score">0.25</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Unprocessed</data>
500
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
501
+ </edge>
502
+ <edge id="e22" source="e4bb2a53-39b1-11ee-871b-bd56e862d10c" target="HOST-2824">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1708870403</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.7</data>
507
+ <data key="e_suspicion_score">0.25</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Unprocessed</data>
514
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
515
+ </edge>
516
+ <edge id="e23" source="HOST-2824" target="e4bb2a53-39b1-11ee-871b-bd56e862d10c">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1708870403</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.7</data>
521
+ <data key="e_suspicion_score">0.25</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Unprocessed</data>
528
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
529
+ </edge>
530
+ <edge id="e24" source="HOST-2824" target="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1708870403</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.7</data>
535
+ <data key="e_suspicion_score">0.25</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Unprocessed</data>
542
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
543
+ </edge>
544
+ <edge id="e25" source="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7" target="HOST-2824">
545
+ <data key="e_type">INCIDENT_LINK</data>
546
+ <data key="e_timestamp">1708870403</data>
547
+ <data key="e_label_binary">malicious</data>
548
+ <data key="e_label_confidence">0.7</data>
549
+ <data key="e_suspicion_score">0.25</data>
550
+ <data key="e_mo_name">Data Theft</data>
551
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
552
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
553
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
554
+ <data key="e_lifecycle_stage">complete-mission</data>
555
+ <data key="e_disposition">Unprocessed</data>
556
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
557
+ </edge>
558
+ <edge id="e26" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2824">
559
+ <data key="e_type">INCIDENT_LINK</data>
560
+ <data key="e_timestamp">1708870403</data>
561
+ <data key="e_label_binary">malicious</data>
562
+ <data key="e_label_confidence">0.7</data>
563
+ <data key="e_suspicion_score">0.25</data>
564
+ <data key="e_mo_name">Data Theft</data>
565
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
566
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
567
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
568
+ <data key="e_lifecycle_stage">complete-mission</data>
569
+ <data key="e_disposition">Unprocessed</data>
570
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
571
+ </edge>
572
+ <edge id="e27" source="HOST-2824" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
573
+ <data key="e_type">INCIDENT_LINK</data>
574
+ <data key="e_timestamp">1708870403</data>
575
+ <data key="e_label_binary">malicious</data>
576
+ <data key="e_label_confidence">0.7</data>
577
+ <data key="e_suspicion_score">0.25</data>
578
+ <data key="e_mo_name">Data Theft</data>
579
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
580
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
581
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
582
+ <data key="e_lifecycle_stage">complete-mission</data>
583
+ <data key="e_disposition">Unprocessed</data>
584
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
585
+ </edge>
586
+ <edge id="e28" source="HOST-2824" target="058039f0-06b9-11ee-bd37-1b3b617bd6b0">
587
+ <data key="e_type">INCIDENT_LINK</data>
588
+ <data key="e_timestamp">1708870403</data>
589
+ <data key="e_label_binary">malicious</data>
590
+ <data key="e_label_confidence">0.7</data>
591
+ <data key="e_suspicion_score">0.25</data>
592
+ <data key="e_mo_name">Data Theft</data>
593
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
594
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
595
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
596
+ <data key="e_lifecycle_stage">complete-mission</data>
597
+ <data key="e_disposition">Unprocessed</data>
598
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
599
+ </edge>
600
+ <edge id="e29" source="058039f0-06b9-11ee-bd37-1b3b617bd6b0" target="HOST-2824">
601
+ <data key="e_type">INCIDENT_LINK</data>
602
+ <data key="e_timestamp">1708870403</data>
603
+ <data key="e_label_binary">malicious</data>
604
+ <data key="e_label_confidence">0.7</data>
605
+ <data key="e_suspicion_score">0.25</data>
606
+ <data key="e_mo_name">Data Theft</data>
607
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
608
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
609
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
610
+ <data key="e_lifecycle_stage">complete-mission</data>
611
+ <data key="e_disposition">Unprocessed</data>
612
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
613
+ </edge>
614
+ <edge id="e30" source="49fcd789-7c7c-11ee-88b1-abd3957241db" target="HOST-2865">
615
+ <data key="e_type">INCIDENT_LINK</data>
616
+ <data key="e_timestamp">1708870403</data>
617
+ <data key="e_label_binary">malicious</data>
618
+ <data key="e_label_confidence">0.7</data>
619
+ <data key="e_suspicion_score">0.25</data>
620
+ <data key="e_mo_name">Data Theft</data>
621
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
622
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
623
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
624
+ <data key="e_lifecycle_stage">complete-mission</data>
625
+ <data key="e_disposition">Unprocessed</data>
626
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
627
+ </edge>
628
+ <edge id="e31" source="HOST-2865" target="49fcd789-7c7c-11ee-88b1-abd3957241db">
629
+ <data key="e_type">INCIDENT_LINK</data>
630
+ <data key="e_timestamp">1708870403</data>
631
+ <data key="e_label_binary">malicious</data>
632
+ <data key="e_label_confidence">0.7</data>
633
+ <data key="e_suspicion_score">0.25</data>
634
+ <data key="e_mo_name">Data Theft</data>
635
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
636
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
637
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
638
+ <data key="e_lifecycle_stage">complete-mission</data>
639
+ <data key="e_disposition">Unprocessed</data>
640
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
641
+ </edge>
642
+ <edge id="e32" source="HOST-2865" target="b71af6f3-3a26-11ee-9a0f-3fd546fc2c4e">
643
+ <data key="e_type">INCIDENT_LINK</data>
644
+ <data key="e_timestamp">1708870403</data>
645
+ <data key="e_label_binary">malicious</data>
646
+ <data key="e_label_confidence">0.7</data>
647
+ <data key="e_suspicion_score">0.25</data>
648
+ <data key="e_mo_name">Data Theft</data>
649
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
650
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
651
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
652
+ <data key="e_lifecycle_stage">complete-mission</data>
653
+ <data key="e_disposition">Unprocessed</data>
654
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
655
+ </edge>
656
+ <edge id="e33" source="e64d3aa0-062d-11ee-a11e-275c53a8bf04" target="HOST-2865">
657
+ <data key="e_type">INCIDENT_LINK</data>
658
+ <data key="e_timestamp">1708870403</data>
659
+ <data key="e_label_binary">malicious</data>
660
+ <data key="e_label_confidence">0.7</data>
661
+ <data key="e_suspicion_score">0.25</data>
662
+ <data key="e_mo_name">Data Theft</data>
663
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
664
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
665
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
666
+ <data key="e_lifecycle_stage">complete-mission</data>
667
+ <data key="e_disposition">Unprocessed</data>
668
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
669
+ </edge>
670
+ <edge id="e34" source="HOST-2865" target="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
671
+ <data key="e_type">INCIDENT_LINK</data>
672
+ <data key="e_timestamp">1708870403</data>
673
+ <data key="e_label_binary">malicious</data>
674
+ <data key="e_label_confidence">0.7</data>
675
+ <data key="e_suspicion_score">0.25</data>
676
+ <data key="e_mo_name">Data Theft</data>
677
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
678
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
679
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
680
+ <data key="e_lifecycle_stage">complete-mission</data>
681
+ <data key="e_disposition">Unprocessed</data>
682
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
683
+ </edge>
684
+ <edge id="e35" source="HOST-2865" target="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
685
+ <data key="e_type">INCIDENT_LINK</data>
686
+ <data key="e_timestamp">1708870403</data>
687
+ <data key="e_label_binary">malicious</data>
688
+ <data key="e_label_confidence">0.7</data>
689
+ <data key="e_suspicion_score">0.25</data>
690
+ <data key="e_mo_name">Data Theft</data>
691
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
692
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
693
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
694
+ <data key="e_lifecycle_stage">complete-mission</data>
695
+ <data key="e_disposition">Unprocessed</data>
696
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
697
+ </edge>
698
+ <edge id="e36" source="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7" target="HOST-2865">
699
+ <data key="e_type">INCIDENT_LINK</data>
700
+ <data key="e_timestamp">1708870403</data>
701
+ <data key="e_label_binary">malicious</data>
702
+ <data key="e_label_confidence">0.7</data>
703
+ <data key="e_suspicion_score">0.25</data>
704
+ <data key="e_mo_name">Data Theft</data>
705
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
706
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
707
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
708
+ <data key="e_lifecycle_stage">complete-mission</data>
709
+ <data key="e_disposition">Unprocessed</data>
710
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
711
+ </edge>
712
+ <edge id="e37" source="HOST-2865" target="713aaef0-2540-11ee-9ba1-a1104bd64ffa">
713
+ <data key="e_type">INCIDENT_LINK</data>
714
+ <data key="e_timestamp">1708870403</data>
715
+ <data key="e_label_binary">malicious</data>
716
+ <data key="e_label_confidence">0.7</data>
717
+ <data key="e_suspicion_score">0.25</data>
718
+ <data key="e_mo_name">Data Theft</data>
719
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
720
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
721
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
722
+ <data key="e_lifecycle_stage">complete-mission</data>
723
+ <data key="e_disposition">Unprocessed</data>
724
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
725
+ </edge>
726
+ <edge id="e38" source="HOST-2761" target="f79d9e50-0626-11ee-8860-f951c26910c1">
727
+ <data key="e_type">INCIDENT_LINK</data>
728
+ <data key="e_timestamp">1708870403</data>
729
+ <data key="e_label_binary">malicious</data>
730
+ <data key="e_label_confidence">0.7</data>
731
+ <data key="e_suspicion_score">0.25</data>
732
+ <data key="e_mo_name">Data Theft</data>
733
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
734
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
735
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
736
+ <data key="e_lifecycle_stage">complete-mission</data>
737
+ <data key="e_disposition">Unprocessed</data>
738
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
739
+ </edge>
740
+ <edge id="e39" source="f79d9e50-0626-11ee-8860-f951c26910c1" target="HOST-2761">
741
+ <data key="e_type">INCIDENT_LINK</data>
742
+ <data key="e_timestamp">1708870403</data>
743
+ <data key="e_label_binary">malicious</data>
744
+ <data key="e_label_confidence">0.7</data>
745
+ <data key="e_suspicion_score">0.25</data>
746
+ <data key="e_mo_name">Data Theft</data>
747
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
748
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
749
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
750
+ <data key="e_lifecycle_stage">complete-mission</data>
751
+ <data key="e_disposition">Unprocessed</data>
752
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
753
+ </edge>
754
+ <edge id="e40" source="HOST-2761" target="13dab800-0b59-11ee-bb77-15fea7d75891">
755
+ <data key="e_type">INCIDENT_LINK</data>
756
+ <data key="e_timestamp">1708870403</data>
757
+ <data key="e_label_binary">malicious</data>
758
+ <data key="e_label_confidence">0.7</data>
759
+ <data key="e_suspicion_score">0.25</data>
760
+ <data key="e_mo_name">Data Theft</data>
761
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
762
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
763
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
764
+ <data key="e_lifecycle_stage">complete-mission</data>
765
+ <data key="e_disposition">Unprocessed</data>
766
+ <data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
767
+ </edge>
768
+ </graph>
769
+ </graphml>
graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="de953280-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.114</data>
35
+ <data key="n_hostname">USER-0015-1204.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="f0028fe0-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.224</data>
43
+ <data key="n_hostname">100.64.71.224</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12664" target="HOST-12764">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1657455349</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">09125650-004a-11ed-825e-31048ffbcace</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12764" target="HOST-12664">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1657455349</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">09125650-004a-11ed-825e-31048ffbcace</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e84e5e01-067e-11ee-8a73-cf5634491628">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.235</data>
35
+ <data key="n_hostname">100.64.76.235</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="5188edc0-062c-11ee-a961-f3aa8f0c341a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.114</data>
43
+ <data key="n_hostname">100.64.71.114</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="b93651c0-19f9-11ee-bd35-ddd746035b48">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.236</data>
51
+ <data key="n_hostname">100.64.76.236</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="e84e5e01-067e-11ee-8a73-cf5634491628" target="HOST-14130">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1688714980</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-14130" target="e84e5e01-067e-11ee-8a73-cf5634491628">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1688714980</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
83
+ </edge>
84
+ <edge id="e3" source="b93651c0-19f9-11ee-bd35-ddd746035b48" target="HOST-14130">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1688714980</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-14130" target="b93651c0-19f9-11ee-bd35-ddd746035b48">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1688714980</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a28eadc2-0350-11ed-8f2c-69edfa1d49ec">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.181</data>
35
+ <data key="n_hostname">100.64.91.181</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="38840493-0a79-11ed-8674-598372048324">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.89453125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="a28eadc2-0350-11ed-8f2c-69edfa1d49ec" target="HOST-16884">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660367767</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">091664b0-1ac7-11ed-9242-7df62b3bf04c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>