Upload per-incident GraphML sharded batch 2/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml +185 -0
- graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml +63 -0
- graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml +77 -0
- graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml +63 -0
- graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml +113 -0
- graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
- graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml +365 -0
- graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml +63 -0
- graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml +63 -0
- graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml +77 -0
- graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
- graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml +63 -0
- graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
- graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
- graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml +63 -0
- graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml +77 -0
- graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml +77 -0
- graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml +157 -0
- graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml +151 -0
- graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml +401 -0
- graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml +77 -0
- graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml +207 -0
- graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
- graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml +387 -0
- graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml +63 -0
- graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml +113 -0
- graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml +63 -0
- graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml +77 -0
- graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
- graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml +63 -0
- graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml +63 -0
- graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
- graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml +63 -0
- graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
- graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
- graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml +157 -0
- graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
- graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml +63 -0
- graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml +63 -0
- graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
- graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml +63 -0
- graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml +63 -0
- graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml +63 -0
- graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml +63 -0
- graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml +769 -0
- graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml +77 -0
- graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml +113 -0
- graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml +63 -0
graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml
ADDED
|
@@ -0,0 +1,185 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.26.29</data>
|
| 35 |
+
<data key="n_hostname">100.64.26.29</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ae87a073-28f4-11ef-9522-c9603914695c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.18.38.152</data>
|
| 43 |
+
<data key="n_hostname">172.18.38.152</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="800bd130-305b-11ef-868f-737db7c2c108">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.26.30</data>
|
| 51 |
+
<data key="n_hostname">100.64.26.30</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="2873da81-2ffc-11ef-9d5b-81cb55900a52">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.26.31</data>
|
| 59 |
+
<data key="n_hostname">100.64.26.31</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="0dfe9d81-3136-11ef-acd3-f95ac44550fc">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.26.32</data>
|
| 67 |
+
<data key="n_hostname">100.64.26.32</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3" target="HOST-4729">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1719128931</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 77 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Disrupted</data>
|
| 84 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="HOST-4729" target="f4dd42a3-2d8b-11ef-b3af-b9fd657f40c3">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1719128931</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 91 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Disrupted</data>
|
| 98 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="800bd130-305b-11ef-868f-737db7c2c108" target="HOST-4729">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1719128931</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 105 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Disrupted</data>
|
| 112 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="HOST-4729" target="800bd130-305b-11ef-868f-737db7c2c108">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1719128931</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 119 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Disrupted</data>
|
| 126 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="2873da81-2ffc-11ef-9d5b-81cb55900a52" target="HOST-4729">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1719128931</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 133 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Disrupted</data>
|
| 140 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="HOST-4729" target="2873da81-2ffc-11ef-9d5b-81cb55900a52">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1719128931</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 147 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Disrupted</data>
|
| 154 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 155 |
+
</edge>
|
| 156 |
+
<edge id="e7" source="0dfe9d81-3136-11ef-acd3-f95ac44550fc" target="HOST-4729">
|
| 157 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 158 |
+
<data key="e_timestamp">1719128931</data>
|
| 159 |
+
<data key="e_label_binary">malicious</data>
|
| 160 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 161 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 162 |
+
<data key="e_mo_name">Data Theft</data>
|
| 163 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 164 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 165 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 166 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 167 |
+
<data key="e_disposition">Disrupted</data>
|
| 168 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 169 |
+
</edge>
|
| 170 |
+
<edge id="e8" source="HOST-4729" target="0dfe9d81-3136-11ef-acd3-f95ac44550fc">
|
| 171 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 172 |
+
<data key="e_timestamp">1719128931</data>
|
| 173 |
+
<data key="e_label_binary">malicious</data>
|
| 174 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 175 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 176 |
+
<data key="e_mo_name">Data Theft</data>
|
| 177 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 178 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 179 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 180 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 181 |
+
<data key="e_disposition">Disrupted</data>
|
| 182 |
+
<data key="e_incident_id">08293240-3135-11ef-82e2-b166e7a5de57</data>
|
| 183 |
+
</edge>
|
| 184 |
+
</graph>
|
| 185 |
+
</graphml>
|
graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.15.72</data>
|
| 35 |
+
<data key="n_hostname">100.64.15.72</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.25.222.10</data>
|
| 43 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-4751" target="HOST-2768">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697389954</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">082c33f0-6b7e-11ee-8294-3ff0afe5b786</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="57b0b435-062c-11ee-89b7-6745718ef904">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.37.13</data>
|
| 35 |
+
<data key="n_hostname">172.30.37.13</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.216</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.216</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17203" target="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1716457891</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">082e2330-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="b89f4d46-d0e5-11ee-be2b-3b68cc3115d8" target="HOST-17203">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1716457891</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">082e2330-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.25.222.10</data>
|
| 35 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c7686070-56e5-11ee-a8d5-c789d38e2e1f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.52.50</data>
|
| 43 |
+
<data key="n_hostname">100.64.52.50</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2768" target="HOST-9023">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695419423</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">082f5100-5992-11ee-8dda-91d41ca493d8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="6fb23292-0625-11ee-bb33-a72cfecde767">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.68.108</data>
|
| 35 |
+
<data key="n_hostname">100.64.68.108</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3e1a77f7-0626-11ee-a31e-2bbd16ce2d59">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.65</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.65</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.6625</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="291b8ee5-901c-11ee-9dd1-eb8813af19a1">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.8.174</data>
|
| 51 |
+
<data key="n_hostname">100.64.8.174</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 54 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-11553" target="HOST-11454">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1701812052</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.746875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-11454" target="HOST-11553">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1701812052</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.746875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="HOST-11587" target="HOST-11454">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1701812052</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.746875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-11454" target="HOST-11587">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1701812052</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.746875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">08316590-93b6-11ee-ad07-e3190f846a2a</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2cf6e855-90a0-11ee-90bb-49febada74fa">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.74.211.215</data>
|
| 35 |
+
<data key="n_hostname">10.74.211.215</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a0018d36-1613-11ee-b7c8-6153d80114e1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.36.194</data>
|
| 43 |
+
<data key="n_hostname">100.64.36.194</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17320" target="HOST-18630">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704249017</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml
ADDED
|
@@ -0,0 +1,365 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="858628f1-0626-11ee-87d2-5909d78e9e20">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.20.41</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1222.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="34ebe7e2-062b-11ee-a5f2-b5ac1054298a">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.11.13</data>
|
| 51 |
+
<data key="n_hostname">100.64.11.13</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="570228e0-0625-11ee-b19f-ed665a42340f">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.10.148</data>
|
| 59 |
+
<data key="n_hostname">USER-0015-1223.example.internal</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="5264fa76-214a-11ee-93ca-7bd3fbeea88b">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.20.42</data>
|
| 67 |
+
<data key="n_hostname">100.64.20.42</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.20.43</data>
|
| 75 |
+
<data key="n_hostname">100.64.20.43</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="12b9a220-062b-11ee-a437-2bfcb70360ca">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.20.44</data>
|
| 83 |
+
<data key="n_hostname">100.64.20.44</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="83249b02-213d-11ee-95f5-9f5c925eda3c">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.20.45</data>
|
| 91 |
+
<data key="n_hostname">100.64.20.45</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.20.46</data>
|
| 99 |
+
<data key="n_hostname">100.64.20.46</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="6e5f5980-0635-11ee-b1b1-97c6cb4541e5">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.20.47</data>
|
| 107 |
+
<data key="n_hostname">100.64.20.47</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<edge id="e1" source="858628f1-0626-11ee-87d2-5909d78e9e20" target="HOST-2750">
|
| 113 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 114 |
+
<data key="e_timestamp">1689231234</data>
|
| 115 |
+
<data key="e_label_binary">malicious</data>
|
| 116 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 117 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 118 |
+
<data key="e_mo_name">Data Theft</data>
|
| 119 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 120 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 121 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 122 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 123 |
+
<data key="e_disposition">Disrupted</data>
|
| 124 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 125 |
+
</edge>
|
| 126 |
+
<edge id="e2" source="HOST-2750" target="858628f1-0626-11ee-87d2-5909d78e9e20">
|
| 127 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 128 |
+
<data key="e_timestamp">1689231234</data>
|
| 129 |
+
<data key="e_label_binary">malicious</data>
|
| 130 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 131 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 132 |
+
<data key="e_mo_name">Data Theft</data>
|
| 133 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 134 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 135 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 136 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 137 |
+
<data key="e_disposition">Disrupted</data>
|
| 138 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 139 |
+
</edge>
|
| 140 |
+
<edge id="e3" source="HOST-2750" target="HOST-3251">
|
| 141 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 142 |
+
<data key="e_timestamp">1689231234</data>
|
| 143 |
+
<data key="e_label_binary">malicious</data>
|
| 144 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 145 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 146 |
+
<data key="e_mo_name">Data Theft</data>
|
| 147 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 148 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 149 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 150 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 151 |
+
<data key="e_disposition">Disrupted</data>
|
| 152 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 153 |
+
</edge>
|
| 154 |
+
<edge id="e4" source="HOST-3251" target="HOST-2750">
|
| 155 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 156 |
+
<data key="e_timestamp">1689231234</data>
|
| 157 |
+
<data key="e_label_binary">malicious</data>
|
| 158 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 159 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 160 |
+
<data key="e_mo_name">Data Theft</data>
|
| 161 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 162 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 163 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 164 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 165 |
+
<data key="e_disposition">Disrupted</data>
|
| 166 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 167 |
+
</edge>
|
| 168 |
+
<edge id="e5" source="570228e0-0625-11ee-b19f-ed665a42340f" target="HOST-2750">
|
| 169 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 170 |
+
<data key="e_timestamp">1689231234</data>
|
| 171 |
+
<data key="e_label_binary">malicious</data>
|
| 172 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 173 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 174 |
+
<data key="e_mo_name">Data Theft</data>
|
| 175 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 176 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 177 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 178 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 179 |
+
<data key="e_disposition">Disrupted</data>
|
| 180 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 181 |
+
</edge>
|
| 182 |
+
<edge id="e6" source="HOST-2750" target="570228e0-0625-11ee-b19f-ed665a42340f">
|
| 183 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 184 |
+
<data key="e_timestamp">1689231234</data>
|
| 185 |
+
<data key="e_label_binary">malicious</data>
|
| 186 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 187 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 188 |
+
<data key="e_mo_name">Data Theft</data>
|
| 189 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 190 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 191 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 192 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 193 |
+
<data key="e_disposition">Disrupted</data>
|
| 194 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 195 |
+
</edge>
|
| 196 |
+
<edge id="e7" source="5264fa76-214a-11ee-93ca-7bd3fbeea88b" target="HOST-2750">
|
| 197 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 198 |
+
<data key="e_timestamp">1689231234</data>
|
| 199 |
+
<data key="e_label_binary">malicious</data>
|
| 200 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 201 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 202 |
+
<data key="e_mo_name">Data Theft</data>
|
| 203 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 204 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 205 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 206 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 207 |
+
<data key="e_disposition">Disrupted</data>
|
| 208 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 209 |
+
</edge>
|
| 210 |
+
<edge id="e8" source="HOST-2750" target="5264fa76-214a-11ee-93ca-7bd3fbeea88b">
|
| 211 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 212 |
+
<data key="e_timestamp">1689231234</data>
|
| 213 |
+
<data key="e_label_binary">malicious</data>
|
| 214 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 215 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 216 |
+
<data key="e_mo_name">Data Theft</data>
|
| 217 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 218 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 219 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 220 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 221 |
+
<data key="e_disposition">Disrupted</data>
|
| 222 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 223 |
+
</edge>
|
| 224 |
+
<edge id="e9" source="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc" target="HOST-2750">
|
| 225 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 226 |
+
<data key="e_timestamp">1689231234</data>
|
| 227 |
+
<data key="e_label_binary">malicious</data>
|
| 228 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 229 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 230 |
+
<data key="e_mo_name">Data Theft</data>
|
| 231 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 232 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 233 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 234 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 235 |
+
<data key="e_disposition">Disrupted</data>
|
| 236 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 237 |
+
</edge>
|
| 238 |
+
<edge id="e10" source="HOST-2750" target="2d494eb0-1d8c-11ee-a54f-418bcc42a5dc">
|
| 239 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 240 |
+
<data key="e_timestamp">1689231234</data>
|
| 241 |
+
<data key="e_label_binary">malicious</data>
|
| 242 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 243 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 244 |
+
<data key="e_mo_name">Data Theft</data>
|
| 245 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 246 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 247 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 248 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 249 |
+
<data key="e_disposition">Disrupted</data>
|
| 250 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 251 |
+
</edge>
|
| 252 |
+
<edge id="e11" source="12b9a220-062b-11ee-a437-2bfcb70360ca" target="HOST-2750">
|
| 253 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 254 |
+
<data key="e_timestamp">1689231234</data>
|
| 255 |
+
<data key="e_label_binary">malicious</data>
|
| 256 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 257 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 258 |
+
<data key="e_mo_name">Data Theft</data>
|
| 259 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 260 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 261 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 262 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 263 |
+
<data key="e_disposition">Disrupted</data>
|
| 264 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 265 |
+
</edge>
|
| 266 |
+
<edge id="e12" source="HOST-2750" target="12b9a220-062b-11ee-a437-2bfcb70360ca">
|
| 267 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 268 |
+
<data key="e_timestamp">1689231234</data>
|
| 269 |
+
<data key="e_label_binary">malicious</data>
|
| 270 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 271 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 272 |
+
<data key="e_mo_name">Data Theft</data>
|
| 273 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 274 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 275 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 276 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 277 |
+
<data key="e_disposition">Disrupted</data>
|
| 278 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 279 |
+
</edge>
|
| 280 |
+
<edge id="e13" source="83249b02-213d-11ee-95f5-9f5c925eda3c" target="HOST-2750">
|
| 281 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 282 |
+
<data key="e_timestamp">1689231234</data>
|
| 283 |
+
<data key="e_label_binary">malicious</data>
|
| 284 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 285 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 286 |
+
<data key="e_mo_name">Data Theft</data>
|
| 287 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 288 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 289 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 290 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 291 |
+
<data key="e_disposition">Disrupted</data>
|
| 292 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 293 |
+
</edge>
|
| 294 |
+
<edge id="e14" source="HOST-2750" target="83249b02-213d-11ee-95f5-9f5c925eda3c">
|
| 295 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 296 |
+
<data key="e_timestamp">1689231234</data>
|
| 297 |
+
<data key="e_label_binary">malicious</data>
|
| 298 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 299 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 300 |
+
<data key="e_mo_name">Data Theft</data>
|
| 301 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 302 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 303 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 304 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 305 |
+
<data key="e_disposition">Disrupted</data>
|
| 306 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 307 |
+
</edge>
|
| 308 |
+
<edge id="e15" source="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1" target="HOST-2750">
|
| 309 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 310 |
+
<data key="e_timestamp">1689231234</data>
|
| 311 |
+
<data key="e_label_binary">malicious</data>
|
| 312 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 313 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 314 |
+
<data key="e_mo_name">Data Theft</data>
|
| 315 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 316 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 317 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 318 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 319 |
+
<data key="e_disposition">Disrupted</data>
|
| 320 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 321 |
+
</edge>
|
| 322 |
+
<edge id="e16" source="HOST-2750" target="bec255e0-09bd-11ee-bf36-9bc3a0a62ed1">
|
| 323 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 324 |
+
<data key="e_timestamp">1689231234</data>
|
| 325 |
+
<data key="e_label_binary">malicious</data>
|
| 326 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 327 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 328 |
+
<data key="e_mo_name">Data Theft</data>
|
| 329 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 330 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 331 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 332 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 333 |
+
<data key="e_disposition">Disrupted</data>
|
| 334 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 335 |
+
</edge>
|
| 336 |
+
<edge id="e17" source="6e5f5980-0635-11ee-b1b1-97c6cb4541e5" target="HOST-2750">
|
| 337 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 338 |
+
<data key="e_timestamp">1689231234</data>
|
| 339 |
+
<data key="e_label_binary">malicious</data>
|
| 340 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 341 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 342 |
+
<data key="e_mo_name">Data Theft</data>
|
| 343 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 344 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 345 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 346 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 347 |
+
<data key="e_disposition">Disrupted</data>
|
| 348 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 349 |
+
</edge>
|
| 350 |
+
<edge id="e18" source="HOST-2750" target="6e5f5980-0635-11ee-b1b1-97c6cb4541e5">
|
| 351 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 352 |
+
<data key="e_timestamp">1689231234</data>
|
| 353 |
+
<data key="e_label_binary">malicious</data>
|
| 354 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 355 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 356 |
+
<data key="e_mo_name">Data Theft</data>
|
| 357 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 358 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 359 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 360 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 361 |
+
<data key="e_disposition">Disrupted</data>
|
| 362 |
+
<data key="e_incident_id">08359590-214a-11ee-ab17-9db2be59825a</data>
|
| 363 |
+
</edge>
|
| 364 |
+
</graph>
|
| 365 |
+
</graphml>
|
graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3ecc9210-51a2-11ee-9af1-99527e64b0b4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.13.93</data>
|
| 35 |
+
<data key="n_hostname">100.64.13.93</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.168.48</data>
|
| 43 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3546" target="HOST-2842">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699508232</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">0837e4a0-7ec2-11ee-a53e-810a167207be</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.25.222.10</data>
|
| 35 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="107c9be0-56e7-11ee-b044-9be6ceaad283">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.15.72</data>
|
| 43 |
+
<data key="n_hostname">100.64.15.72</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2768" target="HOST-4751">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697389954</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">083a3db0-6b7e-11ee-8294-3ff0afe5b786</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3908f7f3-1747-11ee-abff-f708f77657c8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.8.190</data>
|
| 35 |
+
<data key="n_hostname">172.16.8.190</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="390cb440-0c8d-11ee-b099-e767072d48ce">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.87.74</data>
|
| 43 |
+
<data key="n_hostname">100.64.87.74</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3908f7f3-1747-11ee-abff-f708f77657c8" target="390cb440-0c8d-11ee-b099-e767072d48ce">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1716457891</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">083e4fd0-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="390cb440-0c8d-11ee-b099-e767072d48ce" target="3908f7f3-1747-11ee-abff-f708f77657c8">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1716457891</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">083e4fd0-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7c42e850-19c7-11ee-9f6c-f9eff27c79a1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.94.142</data>
|
| 35 |
+
<data key="n_hostname">100.64.94.142</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="8b36c395-0626-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.190.96.179</data>
|
| 43 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="7c42e850-19c7-11ee-9f6c-f9eff27c79a1" target="HOST-17429">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704249017</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08432290-a9e0-11ee-ad25-ed0dad3b42f5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3ecc9210-51a2-11ee-9af1-99527e64b0b4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.13.93</data>
|
| 43 |
+
<data key="n_hostname">100.64.13.93</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="HOST-3546">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699508232</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">084fd970-7ec2-11ee-a53e-810a167207be</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8b36c395-0626-11ee-ad14-25a724519715">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.190.96.179</data>
|
| 35 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="7c42e850-19c7-11ee-9f6c-f9eff27c79a1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.94.142</data>
|
| 43 |
+
<data key="n_hostname">100.64.94.142</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17429" target="HOST-18631">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704249017</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">085523f0-a9e0-11ee-ad25-ed0dad3b42f5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ad3866b0-0937-11ee-af1f-f750a490ee43">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.51.164</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1393.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="ad3866b0-0937-11ee-af1f-f750a490ee43" target="HOST-2858">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714851573</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">0865f080-0a4e-11ef-96bf-b7c516f33db0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="66e185e3-23b6-11ee-b26a-57571f2f7e79">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.40.248</data>
|
| 35 |
+
<data key="n_hostname">100.64.40.248</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.25.222.10</data>
|
| 43 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="66e185e3-23b6-11ee-b26a-57571f2f7e79" target="HOST-2768">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696343700</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">086fb180-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.54.66</data>
|
| 35 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9afc9600-0627-11ee-8794-6bae0a4a6dd8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.24.50</data>
|
| 43 |
+
<data key="n_hostname">100.64.24.50</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2745" target="HOST-5036">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1699285753</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">0870a540-7cbc-11ee-bf1f-2f975ac76263</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.25.222.10</data>
|
| 35 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="66e185e3-23b6-11ee-b26a-57571f2f7e79">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.40.248</data>
|
| 43 |
+
<data key="n_hostname">100.64.40.248</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2768" target="HOST-7343">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696343700</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">087e3070-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="73b38e02-00d3-11ed-a481-83c932d515b3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.71.129</data>
|
| 35 |
+
<data key="n_hostname">100.64.71.129</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="71d97a31-f738-11ec-b574-690aa31b920e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.130</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.130</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="73b38e02-00d3-11ed-a481-83c932d515b3" target="71d97a31-f738-11ec-b574-690aa31b920e">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1658505468</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">088165f0-09d7-11ed-b518-5f11683c5c90</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="71d97a31-f738-11ec-b574-690aa31b920e" target="73b38e02-00d3-11ed-a481-83c932d515b3">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1658505468</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">088165f0-09d7-11ed-b518-5f11683c5c90</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="01d1ab75-41a9-11ed-a587-21753cf039e4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.71.255</data>
|
| 35 |
+
<data key="n_hostname">100.64.71.255</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.82.187</data>
|
| 43 |
+
<data key="n_hostname">100.64.82.187</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-15127" target="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1666301693</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08820df0-50bf-11ed-ba80-7f0cb65843d0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="5c1cc450-44b2-11ed-9241-a5d0d9e3f5b4" target="HOST-15127">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1666301693</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">08820df0-50bf-11ed-ba80-7f0cb65843d0</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml
ADDED
|
@@ -0,0 +1,157 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1e4755e0-063c-11ee-a276-59e1552b002b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.1</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.1</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.27.202.53</data>
|
| 51 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="34776011-2899-11ee-b90e-4f4386b72167">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.59.113</data>
|
| 59 |
+
<data key="n_hostname">100.64.59.113</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.24.191.229</data>
|
| 67 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="HOST-4214" target="HOST-2858">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1694549693</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.7</data>
|
| 77 |
+
<data key="e_suspicion_score">0.25</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Unprocessed</data>
|
| 84 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="HOST-2858" target="HOST-4214">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1694549693</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.7</data>
|
| 91 |
+
<data key="e_suspicion_score">0.25</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Unprocessed</data>
|
| 98 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="HOST-2703" target="34776011-2899-11ee-b90e-4f4386b72167">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1694549693</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.7</data>
|
| 105 |
+
<data key="e_suspicion_score">0.25</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Unprocessed</data>
|
| 112 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="34776011-2899-11ee-b90e-4f4386b72167" target="HOST-2703">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1694549693</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.7</data>
|
| 119 |
+
<data key="e_suspicion_score">0.25</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Unprocessed</data>
|
| 126 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="HOST-2839" target="34776011-2899-11ee-b90e-4f4386b72167">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1694549693</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.7</data>
|
| 133 |
+
<data key="e_suspicion_score">0.25</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Unprocessed</data>
|
| 140 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="34776011-2899-11ee-b90e-4f4386b72167" target="HOST-2839">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1694549693</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.7</data>
|
| 147 |
+
<data key="e_suspicion_score">0.25</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Unprocessed</data>
|
| 154 |
+
<data key="e_incident_id">08871f20-51a9-11ee-8616-91cf6f807a5f</data>
|
| 155 |
+
</edge>
|
| 156 |
+
</graph>
|
| 157 |
+
</graphml>
|
graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,151 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.40.250</data>
|
| 35 |
+
<data key="n_hostname">100.64.40.250</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="72c79372-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.23.168.229</data>
|
| 43 |
+
<data key="n_hostname">172.23.168.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.26.23.117</data>
|
| 51 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.18.38.152</data>
|
| 59 |
+
<data key="n_hostname">172.18.38.152</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.30.208.219</data>
|
| 67 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">172.31.6.172</data>
|
| 75 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<edge id="e1" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2865">
|
| 81 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 82 |
+
<data key="e_timestamp">1696343700</data>
|
| 83 |
+
<data key="e_label_binary">malicious</data>
|
| 84 |
+
<data key="e_label_confidence">0.7</data>
|
| 85 |
+
<data key="e_suspicion_score">0.25</data>
|
| 86 |
+
<data key="e_mo_name">Data Theft</data>
|
| 87 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 88 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 89 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 90 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 91 |
+
<data key="e_disposition">Unprocessed</data>
|
| 92 |
+
<data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 93 |
+
</edge>
|
| 94 |
+
<edge id="e2" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2824">
|
| 95 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 96 |
+
<data key="e_timestamp">1696343700</data>
|
| 97 |
+
<data key="e_label_binary">malicious</data>
|
| 98 |
+
<data key="e_label_confidence">0.7</data>
|
| 99 |
+
<data key="e_suspicion_score">0.25</data>
|
| 100 |
+
<data key="e_mo_name">Data Theft</data>
|
| 101 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 102 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 103 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 104 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 105 |
+
<data key="e_disposition">Unprocessed</data>
|
| 106 |
+
<data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 107 |
+
</edge>
|
| 108 |
+
<edge id="e3" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2844">
|
| 109 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 110 |
+
<data key="e_timestamp">1696343700</data>
|
| 111 |
+
<data key="e_label_binary">malicious</data>
|
| 112 |
+
<data key="e_label_confidence">0.7</data>
|
| 113 |
+
<data key="e_suspicion_score">0.25</data>
|
| 114 |
+
<data key="e_mo_name">Data Theft</data>
|
| 115 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 116 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 117 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 118 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 119 |
+
<data key="e_disposition">Unprocessed</data>
|
| 120 |
+
<data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 121 |
+
</edge>
|
| 122 |
+
<edge id="e4" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2823">
|
| 123 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 124 |
+
<data key="e_timestamp">1696343700</data>
|
| 125 |
+
<data key="e_label_binary">malicious</data>
|
| 126 |
+
<data key="e_label_confidence">0.7</data>
|
| 127 |
+
<data key="e_suspicion_score">0.25</data>
|
| 128 |
+
<data key="e_mo_name">Data Theft</data>
|
| 129 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 130 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 131 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 132 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 133 |
+
<data key="e_disposition">Unprocessed</data>
|
| 134 |
+
<data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 135 |
+
</edge>
|
| 136 |
+
<edge id="e5" source="cb2d08a2-0cee-11ee-b5ac-7d9c94e5c827" target="HOST-2757">
|
| 137 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 138 |
+
<data key="e_timestamp">1696343700</data>
|
| 139 |
+
<data key="e_label_binary">malicious</data>
|
| 140 |
+
<data key="e_label_confidence">0.7</data>
|
| 141 |
+
<data key="e_suspicion_score">0.25</data>
|
| 142 |
+
<data key="e_mo_name">Data Theft</data>
|
| 143 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 144 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 145 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 146 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 147 |
+
<data key="e_disposition">Unprocessed</data>
|
| 148 |
+
<data key="e_incident_id">088b76e0-61fa-11ee-b6b8-b9a4d865fde2</data>
|
| 149 |
+
</edge>
|
| 150 |
+
</graph>
|
| 151 |
+
</graphml>
|
graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml
ADDED
|
@@ -0,0 +1,401 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9af0b1a0-444d-11ee-8c04-a7821a99152a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.2.14</data>
|
| 35 |
+
<data key="n_hostname">100.64.2.14</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.9208984375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="2da8f9c3-f115-11ee-af59-7d60d8b6957d">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.13.54</data>
|
| 51 |
+
<data key="n_hostname">100.64.13.54</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="a9e88660-062c-11ee-b13b-a5c6fa88e64f">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.55.98</data>
|
| 59 |
+
<data key="n_hostname">100.64.55.98</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="e3a25b82-cf47-11ee-b896-4f2f73d92d3f">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.13.3</data>
|
| 67 |
+
<data key="n_hostname">100.64.13.3</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="b51ebd00-1e33-11ee-999e-3bd400a500d1">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.56.225</data>
|
| 75 |
+
<data key="n_hostname">100.64.56.225</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="780ed611-0a25-11ee-a445-4dece889fe2b">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.20.181</data>
|
| 83 |
+
<data key="n_hostname">100.64.20.181</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="a4a28870-133e-11ef-9ba2-79c9fc9dbe31">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.56.226</data>
|
| 91 |
+
<data key="n_hostname">100.64.56.226</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="c47c39a0-062b-11ee-9e9a-d982a9a53684">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.37.114</data>
|
| 99 |
+
<data key="n_hostname">100.64.37.114</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="3fca0f91-3a22-11ee-b455-439f5edf4254">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.56.227</data>
|
| 107 |
+
<data key="n_hostname">100.64.56.227</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="20579840-063c-11ee-8b7c-f5f98afe5c7c">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.56.228</data>
|
| 115 |
+
<data key="n_hostname">100.64.56.228</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="9af0b1a0-444d-11ee-8c04-a7821a99152a" target="HOST-2839">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1715835121</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 125 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-2839" target="9af0b1a0-444d-11ee-8c04-a7821a99152a">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1715835121</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 139 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="HOST-3524" target="HOST-2839">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1715835121</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 153 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Disrupted</data>
|
| 160 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="HOST-2839" target="HOST-3524">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1715835121</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 167 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Disrupted</data>
|
| 174 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="a9e88660-062c-11ee-b13b-a5c6fa88e64f" target="HOST-2839">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1715835121</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 181 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Disrupted</data>
|
| 188 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-2839" target="a9e88660-062c-11ee-b13b-a5c6fa88e64f">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1715835121</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 195 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Disrupted</data>
|
| 202 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="e3a25b82-cf47-11ee-b896-4f2f73d92d3f" target="HOST-2839">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1715835121</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 209 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Disrupted</data>
|
| 216 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="HOST-2839" target="e3a25b82-cf47-11ee-b896-4f2f73d92d3f">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1715835121</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 223 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Disrupted</data>
|
| 230 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="b51ebd00-1e33-11ee-999e-3bd400a500d1" target="HOST-2839">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1715835121</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 237 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Disrupted</data>
|
| 244 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="HOST-2839" target="b51ebd00-1e33-11ee-999e-3bd400a500d1">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1715835121</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 251 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Disrupted</data>
|
| 258 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="HOST-8053" target="HOST-2839">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1715835121</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 265 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Disrupted</data>
|
| 272 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-2839" target="HOST-8053">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1715835121</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 279 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Disrupted</data>
|
| 286 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="a4a28870-133e-11ef-9ba2-79c9fc9dbe31" target="HOST-2839">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1715835121</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 293 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Disrupted</data>
|
| 300 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-2839" target="a4a28870-133e-11ef-9ba2-79c9fc9dbe31">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1715835121</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 307 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Disrupted</data>
|
| 314 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="HOST-6863" target="HOST-2839">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1715835121</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 321 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Disrupted</data>
|
| 328 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-2839" target="HOST-6863">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1715835121</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 335 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Disrupted</data>
|
| 342 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="3fca0f91-3a22-11ee-b455-439f5edf4254" target="HOST-2839">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1715835121</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 349 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Disrupted</data>
|
| 356 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="HOST-2839" target="3fca0f91-3a22-11ee-b455-439f5edf4254">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1715835121</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 363 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Disrupted</data>
|
| 370 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="20579840-063c-11ee-8b7c-f5f98afe5c7c" target="HOST-2839">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1715835121</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 377 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Disrupted</data>
|
| 384 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 385 |
+
</edge>
|
| 386 |
+
<edge id="e20" source="HOST-2839" target="20579840-063c-11ee-8b7c-f5f98afe5c7c">
|
| 387 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 388 |
+
<data key="e_timestamp">1715835121</data>
|
| 389 |
+
<data key="e_label_binary">malicious</data>
|
| 390 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 391 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 392 |
+
<data key="e_mo_name">Data Theft</data>
|
| 393 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 394 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 395 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 396 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 397 |
+
<data key="e_disposition">Disrupted</data>
|
| 398 |
+
<data key="e_incident_id">08921200-1340-11ef-90d6-79b9e3bf2217</data>
|
| 399 |
+
</edge>
|
| 400 |
+
</graph>
|
| 401 |
+
</graphml>
|
graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="46487040-ea92-11ec-90c7-eff83c975df3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.80.32</data>
|
| 35 |
+
<data key="n_hostname">100.64.80.32</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="dbb54410-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.1.158</data>
|
| 43 |
+
<data key="n_hostname">100.64.1.158</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="46487040-ea92-11ec-90c7-eff83c975df3" target="HOST-14109">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655465490</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08a25fb0-ee31-11ec-9c18-c95a461c6308</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-14109" target="46487040-ea92-11ec-90c7-eff83c975df3">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1655465490</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">08a25fb0-ee31-11ec-9c18-c95a461c6308</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml
ADDED
|
@@ -0,0 +1,207 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e7cfde40-ea91-11ec-abf7-619673fe2558">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.73.106</data>
|
| 35 |
+
<data key="n_hostname">100.64.73.106</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="dd10dc70-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.147</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.147</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="1716d5a0-ea92-11ec-abf7-619673fe2558">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.76.182</data>
|
| 51 |
+
<data key="n_hostname">100.64.76.182</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="e4efc8c0-ea91-11ec-abf7-619673fe2558">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.73.200</data>
|
| 59 |
+
<data key="n_hostname">USER-0015-1793.example.internal</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="34281690-ea92-11ec-abf7-619673fe2558">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.71.124</data>
|
| 67 |
+
<data key="n_hostname">100.64.71.124</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="4df55010-ea92-11ec-90c7-eff83c975df3">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.2.213</data>
|
| 75 |
+
<data key="n_hostname">USER-0015-1421.example.internal</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<edge id="e1" source="HOST-13299" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
|
| 81 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 82 |
+
<data key="e_timestamp">1655116309</data>
|
| 83 |
+
<data key="e_label_binary">malicious</data>
|
| 84 |
+
<data key="e_label_confidence">0.7</data>
|
| 85 |
+
<data key="e_suspicion_score">0.25</data>
|
| 86 |
+
<data key="e_mo_name">Data Theft</data>
|
| 87 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 88 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 89 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 90 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 91 |
+
<data key="e_disposition">Unprocessed</data>
|
| 92 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 93 |
+
</edge>
|
| 94 |
+
<edge id="e2" source="HOST-14205" target="HOST-15019">
|
| 95 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 96 |
+
<data key="e_timestamp">1655116309</data>
|
| 97 |
+
<data key="e_label_binary">malicious</data>
|
| 98 |
+
<data key="e_label_confidence">0.7</data>
|
| 99 |
+
<data key="e_suspicion_score">0.25</data>
|
| 100 |
+
<data key="e_mo_name">Data Theft</data>
|
| 101 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 102 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 103 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 104 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 105 |
+
<data key="e_disposition">Unprocessed</data>
|
| 106 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 107 |
+
</edge>
|
| 108 |
+
<edge id="e3" source="HOST-15019" target="HOST-14205">
|
| 109 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 110 |
+
<data key="e_timestamp">1655116309</data>
|
| 111 |
+
<data key="e_label_binary">malicious</data>
|
| 112 |
+
<data key="e_label_confidence">0.7</data>
|
| 113 |
+
<data key="e_suspicion_score">0.25</data>
|
| 114 |
+
<data key="e_mo_name">Data Theft</data>
|
| 115 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 116 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 117 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 118 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 119 |
+
<data key="e_disposition">Unprocessed</data>
|
| 120 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 121 |
+
</edge>
|
| 122 |
+
<edge id="e4" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="HOST-12694">
|
| 123 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 124 |
+
<data key="e_timestamp">1655116309</data>
|
| 125 |
+
<data key="e_label_binary">malicious</data>
|
| 126 |
+
<data key="e_label_confidence">0.7</data>
|
| 127 |
+
<data key="e_suspicion_score">0.25</data>
|
| 128 |
+
<data key="e_mo_name">Data Theft</data>
|
| 129 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 130 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 131 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 132 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 133 |
+
<data key="e_disposition">Unprocessed</data>
|
| 134 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 135 |
+
</edge>
|
| 136 |
+
<edge id="e5" source="HOST-12694" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
|
| 137 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 138 |
+
<data key="e_timestamp">1655116309</data>
|
| 139 |
+
<data key="e_label_binary">malicious</data>
|
| 140 |
+
<data key="e_label_confidence">0.7</data>
|
| 141 |
+
<data key="e_suspicion_score">0.25</data>
|
| 142 |
+
<data key="e_mo_name">Data Theft</data>
|
| 143 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 144 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 145 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 146 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 147 |
+
<data key="e_disposition">Unprocessed</data>
|
| 148 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 149 |
+
</edge>
|
| 150 |
+
<edge id="e6" source="4df55010-ea92-11ec-90c7-eff83c975df3" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
|
| 151 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 152 |
+
<data key="e_timestamp">1655116309</data>
|
| 153 |
+
<data key="e_label_binary">malicious</data>
|
| 154 |
+
<data key="e_label_confidence">0.7</data>
|
| 155 |
+
<data key="e_suspicion_score">0.25</data>
|
| 156 |
+
<data key="e_mo_name">Data Theft</data>
|
| 157 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 158 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 159 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 160 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 161 |
+
<data key="e_disposition">Unprocessed</data>
|
| 162 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 163 |
+
</edge>
|
| 164 |
+
<edge id="e7" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="4df55010-ea92-11ec-90c7-eff83c975df3">
|
| 165 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 166 |
+
<data key="e_timestamp">1655116309</data>
|
| 167 |
+
<data key="e_label_binary">malicious</data>
|
| 168 |
+
<data key="e_label_confidence">0.7</data>
|
| 169 |
+
<data key="e_suspicion_score">0.25</data>
|
| 170 |
+
<data key="e_mo_name">Data Theft</data>
|
| 171 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 172 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 173 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 174 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 175 |
+
<data key="e_disposition">Unprocessed</data>
|
| 176 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 177 |
+
</edge>
|
| 178 |
+
<edge id="e8" source="dd10dc70-ea91-11ec-90c7-eff83c975df3" target="HOST-13299">
|
| 179 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 180 |
+
<data key="e_timestamp">1655116309</data>
|
| 181 |
+
<data key="e_label_binary">malicious</data>
|
| 182 |
+
<data key="e_label_confidence">0.7</data>
|
| 183 |
+
<data key="e_suspicion_score">0.25</data>
|
| 184 |
+
<data key="e_mo_name">Data Theft</data>
|
| 185 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 186 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 187 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 188 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 189 |
+
<data key="e_disposition">Unprocessed</data>
|
| 190 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 191 |
+
</edge>
|
| 192 |
+
<edge id="e9" source="HOST-14205" target="dd10dc70-ea91-11ec-90c7-eff83c975df3">
|
| 193 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 194 |
+
<data key="e_timestamp">1655116309</data>
|
| 195 |
+
<data key="e_label_binary">malicious</data>
|
| 196 |
+
<data key="e_label_confidence">0.7</data>
|
| 197 |
+
<data key="e_suspicion_score">0.25</data>
|
| 198 |
+
<data key="e_mo_name">Data Theft</data>
|
| 199 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 200 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 201 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 202 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 203 |
+
<data key="e_disposition">Unprocessed</data>
|
| 204 |
+
<data key="e_incident_id">08ad89b0-eb04-11ec-ab19-e1eaa4a88f94</data>
|
| 205 |
+
</edge>
|
| 206 |
+
</graph>
|
| 207 |
+
</graphml>
|
graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a967e0f0-31ab-11ee-96a8-13610f689ebc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.50.121</data>
|
| 35 |
+
<data key="n_hostname">100.64.50.121</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.40.149</data>
|
| 43 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-8780" target="HOST-2834">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708379488</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08b3a8b0-cf71-11ee-9f4f-f950118d6926</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml
ADDED
|
@@ -0,0 +1,387 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ee8b8a92-2d75-11ee-abd3-9bc3af0e7df1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.26.239</data>
|
| 35 |
+
<data key="n_hostname">100.64.26.239</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.232.220</data>
|
| 43 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.62.247</data>
|
| 51 |
+
<data key="n_hostname">100.64.62.247</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="54ffb372-2635-11ee-b528-33a166535f4a">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.62.248</data>
|
| 59 |
+
<data key="n_hostname">100.64.62.248</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.30.229.11</data>
|
| 67 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="3e12c124-2f36-11ee-b118-cd33c6868f95">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.62.249</data>
|
| 75 |
+
<data key="n_hostname">100.64.62.249</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="202b8de4-4403-11ee-8a41-2d95f07923e3">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.62.250</data>
|
| 83 |
+
<data key="n_hostname">100.64.62.250</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="3c0a1912-0627-11ee-9882-3f47c834d49b">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.8.109</data>
|
| 91 |
+
<data key="n_hostname">100.64.8.109</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="c0b39d11-0624-11ee-9a0c-b9f8978d847e">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.7.230</data>
|
| 99 |
+
<data key="n_hostname">100.64.7.230</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="8f580111-0625-11ee-8860-f951c26910c1">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.35.196</data>
|
| 107 |
+
<data key="n_hostname">100.64.35.196</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="dada5cb0-062e-11ee-a1d3-93ab5e0cb06b">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.14.84</data>
|
| 115 |
+
<data key="n_hostname">100.64.14.84</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="HOST-5434" target="HOST-2748">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1693048602</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7</data>
|
| 125 |
+
<data key="e_suspicion_score">0.25</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Unprocessed</data>
|
| 132 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-2748" target="HOST-5434">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1693048602</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7</data>
|
| 139 |
+
<data key="e_suspicion_score">0.25</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Unprocessed</data>
|
| 146 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8" target="HOST-2748">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1693048602</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.7</data>
|
| 153 |
+
<data key="e_suspicion_score">0.25</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Unprocessed</data>
|
| 160 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="HOST-2748" target="cea5c2f0-3bc5-11ee-a7d7-3d2c72fff5d8">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1693048602</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.7</data>
|
| 167 |
+
<data key="e_suspicion_score">0.25</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Unprocessed</data>
|
| 174 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="54ffb372-2635-11ee-b528-33a166535f4a" target="HOST-2748">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1693048602</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.7</data>
|
| 181 |
+
<data key="e_suspicion_score">0.25</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Unprocessed</data>
|
| 188 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-2748" target="54ffb372-2635-11ee-b528-33a166535f4a">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1693048602</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.7</data>
|
| 195 |
+
<data key="e_suspicion_score">0.25</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Unprocessed</data>
|
| 202 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="54ffb372-2635-11ee-b528-33a166535f4a" target="HOST-2750">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1693048602</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.7</data>
|
| 209 |
+
<data key="e_suspicion_score">0.25</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Unprocessed</data>
|
| 216 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="3e12c124-2f36-11ee-b118-cd33c6868f95" target="HOST-2748">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1693048602</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.7</data>
|
| 223 |
+
<data key="e_suspicion_score">0.25</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Unprocessed</data>
|
| 230 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="HOST-2748" target="3e12c124-2f36-11ee-b118-cd33c6868f95">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1693048602</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.7</data>
|
| 237 |
+
<data key="e_suspicion_score">0.25</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Unprocessed</data>
|
| 244 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="202b8de4-4403-11ee-8a41-2d95f07923e3" target="HOST-2748">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1693048602</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.7</data>
|
| 251 |
+
<data key="e_suspicion_score">0.25</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Unprocessed</data>
|
| 258 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="HOST-2748" target="202b8de4-4403-11ee-8a41-2d95f07923e3">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1693048602</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.7</data>
|
| 265 |
+
<data key="e_suspicion_score">0.25</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Unprocessed</data>
|
| 272 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-2891" target="HOST-2748">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1693048602</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.7</data>
|
| 279 |
+
<data key="e_suspicion_score">0.25</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Unprocessed</data>
|
| 286 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="HOST-2748" target="HOST-2891">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1693048602</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.7</data>
|
| 293 |
+
<data key="e_suspicion_score">0.25</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Unprocessed</data>
|
| 300 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-2817" target="HOST-2748">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1693048602</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.7</data>
|
| 307 |
+
<data key="e_suspicion_score">0.25</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Unprocessed</data>
|
| 314 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="HOST-2748" target="HOST-2817">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1693048602</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.7</data>
|
| 321 |
+
<data key="e_suspicion_score">0.25</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Unprocessed</data>
|
| 328 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-6629" target="HOST-2748">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1693048602</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.7</data>
|
| 335 |
+
<data key="e_suspicion_score">0.25</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Unprocessed</data>
|
| 342 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="HOST-2748" target="HOST-6629">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1693048602</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.7</data>
|
| 349 |
+
<data key="e_suspicion_score">0.25</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Unprocessed</data>
|
| 356 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="HOST-4935" target="HOST-2748">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1693048602</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.7</data>
|
| 363 |
+
<data key="e_suspicion_score">0.25</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Unprocessed</data>
|
| 370 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="HOST-2748" target="HOST-4935">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1693048602</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.7</data>
|
| 377 |
+
<data key="e_suspicion_score">0.25</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Unprocessed</data>
|
| 384 |
+
<data key="e_incident_id">08b58040-4402-11ee-b97c-f959f41b9d07</data>
|
| 385 |
+
</edge>
|
| 386 |
+
</graph>
|
| 387 |
+
</graphml>
|
graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="cedfd933-0624-11ee-b144-2b760827f5b0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.32.192</data>
|
| 35 |
+
<data key="n_hostname">100.64.32.192</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.247.113</data>
|
| 43 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-6250" target="HOST-2759">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1694332797</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08b71a40-4fb0-11ee-bb6d-6beb4ab99de5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2dfcae90-0632-11ee-9292-037474792a78">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.44.200</data>
|
| 35 |
+
<data key="n_hostname">100.64.44.200</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.76.245</data>
|
| 43 |
+
<data key="n_hostname">100.64.76.245</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="791ad080-0643-11ee-93f4-159fa6734fa9">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.15.138</data>
|
| 51 |
+
<data key="n_hostname">100.64.15.138</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="2dfcae90-0632-11ee-9292-037474792a78" target="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1687085469</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.71875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8" target="2dfcae90-0632-11ee-9292-037474792a78">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1687085469</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.71875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="791ad080-0643-11ee-93f4-159fa6734fa9" target="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1687085469</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.71875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="e2e269f1-0630-11ee-bdf7-87ac9a90e1b8" target="791ad080-0643-11ee-93f4-159fa6734fa9">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1687085469</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.71875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">08baa740-0dc6-11ee-a3ba-756feea53057</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="993480b2-f8b4-11ed-80b3-5f000bc2563f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.45.213</data>
|
| 35 |
+
<data key="n_hostname">100.64.45.213</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b64ce794-c822-11ed-93e7-73b4f1774f3f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.182.227</data>
|
| 43 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="993480b2-f8b4-11ed-80b3-5f000bc2563f" target="HOST-2743">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1685000692</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08bcb5c0-fad0-11ed-b0ec-2b4cf5491294</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3b0e5fb1-0642-11ee-93f4-159fa6734fa9">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.50.40</data>
|
| 35 |
+
<data key="n_hostname">192.168.50.40</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="8f36ce61-062e-11ee-9d60-e7b9fbc351b9">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.83.49</data>
|
| 43 |
+
<data key="n_hostname">100.64.83.49</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3b0e5fb1-0642-11ee-93f4-159fa6734fa9" target="8f36ce61-062e-11ee-9d60-e7b9fbc351b9">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688041100</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08c128e0-1677-11ee-a523-a1913ea7dc39</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="8f36ce61-062e-11ee-9d60-e7b9fbc351b9" target="3b0e5fb1-0642-11ee-93f4-159fa6734fa9">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1688041100</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">08c128e0-1677-11ee-a523-a1913ea7dc39</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.29.40.149</data>
|
| 35 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a967e0f0-31ab-11ee-96a8-13610f689ebc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.50.121</data>
|
| 43 |
+
<data key="n_hostname">100.64.50.121</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2834" target="HOST-8780">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708379488</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08c498a0-cf71-11ee-9f4f-f950118d6926</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.247.113</data>
|
| 35 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cedfd933-0624-11ee-b144-2b760827f5b0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.32.192</data>
|
| 43 |
+
<data key="n_hostname">100.64.32.192</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2759" target="HOST-6250">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1694332797</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08c5c040-4fb0-11ee-bb6d-6beb4ab99de5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.22.127.96</data>
|
| 35 |
+
<data key="n_hostname">172.22.127.96</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="290ae893-065d-11ee-8944-dfa0a5726503">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.25.125</data>
|
| 43 |
+
<data key="n_hostname">100.64.25.125</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2726" target="HOST-5228">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689980277</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08cbd1a0-281a-11ee-b06f-b17f5f626799</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.229.11</data>
|
| 35 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="eb553d62-0626-11ee-a48a-ff0b3de2e266">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.23.45</data>
|
| 43 |
+
<data key="n_hostname">100.64.23.45</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2750" target="HOST-4898">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708379488</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08d22d30-cf71-11ee-9f4f-f950118d6926</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.207.79.45</data>
|
| 35 |
+
<data key="n_hostname">100.64.86.76</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3e53b165-2d2b-11ee-8189-49ff8e53e7f4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.31.25</data>
|
| 43 |
+
<data key="n_hostname">100.64.31.25</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17156" target="3e53b165-2d2b-11ee-8189-49ff8e53e7f4">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704249018</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08dcf190-a9e0-11ee-ad25-ed0dad3b42f5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.92.108</data>
|
| 35 |
+
<data key="n_hostname">100.64.92.108</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.74.211.215</data>
|
| 43 |
+
<data key="n_hostname">10.74.211.215</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c" target="HOST-16902">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1678001184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08e18730-bb27-11ed-b3d4-01a3306b45e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c7749390-053b-11ef-b786-db1e1a895879">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.51.166</data>
|
| 35 |
+
<data key="n_hostname">100.64.51.166</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="c7749390-053b-11ef-b786-db1e1a895879" target="HOST-2839">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714851574</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08e3d310-0a4e-11ef-96bf-b7c516f33db0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml
ADDED
|
@@ -0,0 +1,157 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5dcf6ab4-9c5d-11ee-97aa-57da93db24ea">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.125</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.125</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.23</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.23</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","Protect"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="84fc2d39-de16-11ee-b925-e79fb64e6ce3">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.21.1</data>
|
| 51 |
+
<data key="n_hostname">100.64.21.1</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="c9c2af89-0625-11ee-9f36-61ae8743c399">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.68.10</data>
|
| 59 |
+
<data key="n_hostname">100.64.68.10</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="18e9a49f-df35-11ee-b282-49286df51aec">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.70.190</data>
|
| 67 |
+
<data key="n_hostname">100.64.70.190</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="HOST-12528" target="HOST-11393">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1710159752</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.7</data>
|
| 77 |
+
<data key="e_suspicion_score">0.25</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Unprocessed</data>
|
| 84 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="HOST-11393" target="HOST-12528">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1710159752</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.7</data>
|
| 91 |
+
<data key="e_suspicion_score">0.25</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Unprocessed</data>
|
| 98 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="HOST-12529" target="HOST-11380">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1710159752</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.7</data>
|
| 105 |
+
<data key="e_suspicion_score">0.25</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Unprocessed</data>
|
| 112 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="HOST-11380" target="HOST-12529">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1710159752</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.7</data>
|
| 119 |
+
<data key="e_suspicion_score">0.25</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Unprocessed</data>
|
| 126 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="HOST-11380" target="HOST-12530">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1710159752</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.7</data>
|
| 133 |
+
<data key="e_suspicion_score">0.25</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Unprocessed</data>
|
| 140 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="HOST-12530" target="HOST-11380">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1710159752</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.7</data>
|
| 147 |
+
<data key="e_suspicion_score">0.25</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Unprocessed</data>
|
| 154 |
+
<data key="e_incident_id">08e53880-dfa2-11ee-9120-ff7b7094ac3d</data>
|
| 155 |
+
</edge>
|
| 156 |
+
</graph>
|
| 157 |
+
</graphml>
|
graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.74.211.215</data>
|
| 35 |
+
<data key="n_hostname">10.74.211.215</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="08bee405-bb27-11ed-abfc-3b7dc9a7ff7c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.92.108</data>
|
| 43 |
+
<data key="n_hostname">100.64.92.108</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16902" target="HOST-18299">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1678001184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08e88c10-bb27-11ed-b3d4-01a3306b45e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b51090eb-1865-11ef-a876-673d6ce79e72">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.95.218</data>
|
| 35 |
+
<data key="n_hostname">100.64.95.218</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b51090eb-1865-11ef-a876-673d6ce79e72" target="HOST-16999">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1716457892</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08e95ce0-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da39c010-2f24-11ee-bea3-4b3cea480881">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.35.168</data>
|
| 35 |
+
<data key="n_hostname">100.64.35.168</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.214.148</data>
|
| 43 |
+
<data key="n_hostname">172.30.214.148</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="da39c010-2f24-11ee-bea3-4b3cea480881" target="HOST-2720">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696121222</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08ea8430-5ff4-11ee-a4ff-1bc46b312733</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.92.110</data>
|
| 35 |
+
<data key="n_hostname">100.64.92.110</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="99448930-9f02-11ed-a78c-3fd929c8fa44">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.207.79.45</data>
|
| 43 |
+
<data key="n_hostname">100.64.84.55</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c" target="HOST-17141">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1678001184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08eaaef0-bb27-11ed-b3d4-01a3306b45e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="99448930-9f02-11ed-a78c-3fd929c8fa44">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.207.79.45</data>
|
| 35 |
+
<data key="n_hostname">100.64.84.55</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="08bf3223-bb27-11ed-abfc-3b7dc9a7ff7c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.92.110</data>
|
| 43 |
+
<data key="n_hostname">100.64.92.110</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17141" target="HOST-18300">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1678001184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08ede340-bb27-11ed-b3d4-01a3306b45e6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3ece5322-cb2d-11ee-9222-b5c91e8078aa">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.50.123</data>
|
| 35 |
+
<data key="n_hostname">100.64.50.123</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.40.149</data>
|
| 43 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3ece5322-cb2d-11ee-9222-b5c91e8078aa" target="HOST-2834">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708379488</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">08f23850-cf71-11ee-9f4f-f950118d6926</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.191.229</data>
|
| 35 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c7749390-053b-11ef-b786-db1e1a895879">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.51.166</data>
|
| 43 |
+
<data key="n_hostname">100.64.51.166</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2839" target="HOST-8945">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714851574</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">08f670b0-0a4e-11ef-96bf-b7c516f33db0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.113.78.104</data>
|
| 35 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b51090eb-1865-11ef-a876-673d6ce79e72">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.218</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.218</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16999" target="HOST-18907">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1716457892</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">090410d0-18ea-11ef-94b0-d3858c4ed3ac</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml
ADDED
|
@@ -0,0 +1,769 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bb6b80e0-0627-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.8.106</data>
|
| 35 |
+
<data key="n_hostname">100.64.8.106</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.182.227</data>
|
| 43 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="7abcf143-8ae9-11ee-94c6-013af54e9a5e">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.8.107</data>
|
| 51 |
+
<data key="n_hostname">100.64.8.107</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.8.108</data>
|
| 59 |
+
<data key="n_hostname">100.64.8.108</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="3c0a1912-0627-11ee-9882-3f47c834d49b">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.8.109</data>
|
| 67 |
+
<data key="n_hostname">100.64.8.109</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="2029e470-062f-11ee-978b-f374a5593a56">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.8.110</data>
|
| 75 |
+
<data key="n_hostname">100.64.8.110</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.8.111</data>
|
| 83 |
+
<data key="n_hostname">100.64.8.111</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="fdb24763-0625-11ee-b19f-ed665a42340f">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.8.112</data>
|
| 91 |
+
<data key="n_hostname">100.64.8.112</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="72c79372-0626-11ee-b19f-ed665a42340f">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">172.23.168.229</data>
|
| 99 |
+
<data key="n_hostname">172.23.168.229</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="34f23c20-d3d1-11ee-897b-715784089999">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.8.113</data>
|
| 107 |
+
<data key="n_hostname">100.64.8.113</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="6a078403-0628-11ee-b35a-9d13f89576c6">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.8.114</data>
|
| 115 |
+
<data key="n_hostname">100.64.8.114</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="36b45663-062c-11ee-a75f-ef84e9044642">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">172.26.73.92</data>
|
| 123 |
+
<data key="n_hostname">172.26.73.92</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="e4bb2a53-39b1-11ee-871b-bd56e862d10c">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.8.115</data>
|
| 131 |
+
<data key="n_hostname">100.64.8.115</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">172.26.23.117</data>
|
| 139 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.8.116</data>
|
| 147 |
+
<data key="n_hostname">100.64.8.116</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="058039f0-06b9-11ee-bd37-1b3b617bd6b0">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.8.117</data>
|
| 155 |
+
<data key="n_hostname">100.64.8.117</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="49fcd789-7c7c-11ee-88b1-abd3957241db">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.8.118</data>
|
| 163 |
+
<data key="n_hostname">100.64.8.118</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="b71af6f3-3a26-11ee-9a0f-3fd546fc2c4e">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.8.119</data>
|
| 171 |
+
<data key="n_hostname">100.64.8.119</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.8.120</data>
|
| 179 |
+
<data key="n_hostname">100.64.8.120</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="713aaef0-2540-11ee-9ba1-a1104bd64ffa">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.8.121</data>
|
| 187 |
+
<data key="n_hostname">100.64.8.121</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="f79d9e50-0626-11ee-8860-f951c26910c1">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.8.122</data>
|
| 195 |
+
<data key="n_hostname">100.64.8.122</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="13dab800-0b59-11ee-bb77-15fea7d75891">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.8.123</data>
|
| 203 |
+
<data key="n_hostname">100.64.8.123</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<edge id="e1" source="bb6b80e0-0627-11ee-bb6d-91e4d286acbc" target="HOST-2761">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1708870403</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.7</data>
|
| 213 |
+
<data key="e_suspicion_score">0.25</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Unprocessed</data>
|
| 220 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e2" source="HOST-2761" target="bb6b80e0-0627-11ee-bb6d-91e4d286acbc">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1708870403</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.7</data>
|
| 227 |
+
<data key="e_suspicion_score">0.25</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Unprocessed</data>
|
| 234 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e3" source="7abcf143-8ae9-11ee-94c6-013af54e9a5e" target="HOST-2761">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1708870403</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.7</data>
|
| 241 |
+
<data key="e_suspicion_score">0.25</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Unprocessed</data>
|
| 248 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e4" source="HOST-2761" target="7abcf143-8ae9-11ee-94c6-013af54e9a5e">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1708870403</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.7</data>
|
| 255 |
+
<data key="e_suspicion_score">0.25</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Unprocessed</data>
|
| 262 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e5" source="fb871871-98ed-11ee-bd7a-6d2409f4df1b" target="HOST-2761">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1708870403</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.7</data>
|
| 269 |
+
<data key="e_suspicion_score">0.25</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Unprocessed</data>
|
| 276 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e6" source="HOST-2761" target="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1708870403</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.7</data>
|
| 283 |
+
<data key="e_suspicion_score">0.25</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Unprocessed</data>
|
| 290 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e7" source="3c0a1912-0627-11ee-9882-3f47c834d49b" target="HOST-2761">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1708870403</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.7</data>
|
| 297 |
+
<data key="e_suspicion_score">0.25</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Unprocessed</data>
|
| 304 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e8" source="HOST-2761" target="3c0a1912-0627-11ee-9882-3f47c834d49b">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1708870403</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.7</data>
|
| 311 |
+
<data key="e_suspicion_score">0.25</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Unprocessed</data>
|
| 318 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e9" source="2029e470-062f-11ee-978b-f374a5593a56" target="HOST-2761">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1708870403</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.7</data>
|
| 325 |
+
<data key="e_suspicion_score">0.25</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Unprocessed</data>
|
| 332 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e10" source="HOST-2761" target="2029e470-062f-11ee-978b-f374a5593a56">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1708870403</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.7</data>
|
| 339 |
+
<data key="e_suspicion_score">0.25</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Unprocessed</data>
|
| 346 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e11" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2761">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1708870403</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.7</data>
|
| 353 |
+
<data key="e_suspicion_score">0.25</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Unprocessed</data>
|
| 360 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e12" source="HOST-2761" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1708870403</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.7</data>
|
| 367 |
+
<data key="e_suspicion_score">0.25</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Unprocessed</data>
|
| 374 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e13" source="fdb24763-0625-11ee-b19f-ed665a42340f" target="HOST-2865">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1708870403</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.7</data>
|
| 381 |
+
<data key="e_suspicion_score">0.25</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Unprocessed</data>
|
| 388 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e14" source="HOST-2865" target="fdb24763-0625-11ee-b19f-ed665a42340f">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1708870403</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.7</data>
|
| 395 |
+
<data key="e_suspicion_score">0.25</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Unprocessed</data>
|
| 402 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e15" source="34f23c20-d3d1-11ee-897b-715784089999" target="HOST-2865">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1708870403</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.7</data>
|
| 409 |
+
<data key="e_suspicion_score">0.25</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Unprocessed</data>
|
| 416 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e16" source="HOST-2865" target="34f23c20-d3d1-11ee-897b-715784089999">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1708870403</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.7</data>
|
| 423 |
+
<data key="e_suspicion_score">0.25</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Unprocessed</data>
|
| 430 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e17" source="6a078403-0628-11ee-b35a-9d13f89576c6" target="HOST-2865">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1708870403</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.7</data>
|
| 437 |
+
<data key="e_suspicion_score">0.25</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Unprocessed</data>
|
| 444 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e18" source="HOST-2865" target="6a078403-0628-11ee-b35a-9d13f89576c6">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1708870403</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.7</data>
|
| 451 |
+
<data key="e_suspicion_score">0.25</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Unprocessed</data>
|
| 458 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e19" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2865">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1708870403</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.7</data>
|
| 465 |
+
<data key="e_suspicion_score">0.25</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Unprocessed</data>
|
| 472 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e20" source="HOST-2865" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1708870403</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.7</data>
|
| 479 |
+
<data key="e_suspicion_score">0.25</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Unprocessed</data>
|
| 486 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e21" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2724">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1708870403</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.7</data>
|
| 493 |
+
<data key="e_suspicion_score">0.25</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Unprocessed</data>
|
| 500 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e22" source="e4bb2a53-39b1-11ee-871b-bd56e862d10c" target="HOST-2824">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1708870403</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.7</data>
|
| 507 |
+
<data key="e_suspicion_score">0.25</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Unprocessed</data>
|
| 514 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e23" source="HOST-2824" target="e4bb2a53-39b1-11ee-871b-bd56e862d10c">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1708870403</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.7</data>
|
| 521 |
+
<data key="e_suspicion_score">0.25</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Unprocessed</data>
|
| 528 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e24" source="HOST-2824" target="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1708870403</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.7</data>
|
| 535 |
+
<data key="e_suspicion_score">0.25</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Unprocessed</data>
|
| 542 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 543 |
+
</edge>
|
| 544 |
+
<edge id="e25" source="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7" target="HOST-2824">
|
| 545 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 546 |
+
<data key="e_timestamp">1708870403</data>
|
| 547 |
+
<data key="e_label_binary">malicious</data>
|
| 548 |
+
<data key="e_label_confidence">0.7</data>
|
| 549 |
+
<data key="e_suspicion_score">0.25</data>
|
| 550 |
+
<data key="e_mo_name">Data Theft</data>
|
| 551 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 552 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 553 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 554 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 555 |
+
<data key="e_disposition">Unprocessed</data>
|
| 556 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 557 |
+
</edge>
|
| 558 |
+
<edge id="e26" source="c52a20d3-bc1d-11ee-9be3-bbac05820e8c" target="HOST-2824">
|
| 559 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 560 |
+
<data key="e_timestamp">1708870403</data>
|
| 561 |
+
<data key="e_label_binary">malicious</data>
|
| 562 |
+
<data key="e_label_confidence">0.7</data>
|
| 563 |
+
<data key="e_suspicion_score">0.25</data>
|
| 564 |
+
<data key="e_mo_name">Data Theft</data>
|
| 565 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 566 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 567 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 568 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 569 |
+
<data key="e_disposition">Unprocessed</data>
|
| 570 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 571 |
+
</edge>
|
| 572 |
+
<edge id="e27" source="HOST-2824" target="c52a20d3-bc1d-11ee-9be3-bbac05820e8c">
|
| 573 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 574 |
+
<data key="e_timestamp">1708870403</data>
|
| 575 |
+
<data key="e_label_binary">malicious</data>
|
| 576 |
+
<data key="e_label_confidence">0.7</data>
|
| 577 |
+
<data key="e_suspicion_score">0.25</data>
|
| 578 |
+
<data key="e_mo_name">Data Theft</data>
|
| 579 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 580 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 581 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 582 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 583 |
+
<data key="e_disposition">Unprocessed</data>
|
| 584 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 585 |
+
</edge>
|
| 586 |
+
<edge id="e28" source="HOST-2824" target="058039f0-06b9-11ee-bd37-1b3b617bd6b0">
|
| 587 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 588 |
+
<data key="e_timestamp">1708870403</data>
|
| 589 |
+
<data key="e_label_binary">malicious</data>
|
| 590 |
+
<data key="e_label_confidence">0.7</data>
|
| 591 |
+
<data key="e_suspicion_score">0.25</data>
|
| 592 |
+
<data key="e_mo_name">Data Theft</data>
|
| 593 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 594 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 595 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 596 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 597 |
+
<data key="e_disposition">Unprocessed</data>
|
| 598 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 599 |
+
</edge>
|
| 600 |
+
<edge id="e29" source="058039f0-06b9-11ee-bd37-1b3b617bd6b0" target="HOST-2824">
|
| 601 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 602 |
+
<data key="e_timestamp">1708870403</data>
|
| 603 |
+
<data key="e_label_binary">malicious</data>
|
| 604 |
+
<data key="e_label_confidence">0.7</data>
|
| 605 |
+
<data key="e_suspicion_score">0.25</data>
|
| 606 |
+
<data key="e_mo_name">Data Theft</data>
|
| 607 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 608 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 609 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 610 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 611 |
+
<data key="e_disposition">Unprocessed</data>
|
| 612 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 613 |
+
</edge>
|
| 614 |
+
<edge id="e30" source="49fcd789-7c7c-11ee-88b1-abd3957241db" target="HOST-2865">
|
| 615 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 616 |
+
<data key="e_timestamp">1708870403</data>
|
| 617 |
+
<data key="e_label_binary">malicious</data>
|
| 618 |
+
<data key="e_label_confidence">0.7</data>
|
| 619 |
+
<data key="e_suspicion_score">0.25</data>
|
| 620 |
+
<data key="e_mo_name">Data Theft</data>
|
| 621 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 622 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 623 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 624 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 625 |
+
<data key="e_disposition">Unprocessed</data>
|
| 626 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 627 |
+
</edge>
|
| 628 |
+
<edge id="e31" source="HOST-2865" target="49fcd789-7c7c-11ee-88b1-abd3957241db">
|
| 629 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 630 |
+
<data key="e_timestamp">1708870403</data>
|
| 631 |
+
<data key="e_label_binary">malicious</data>
|
| 632 |
+
<data key="e_label_confidence">0.7</data>
|
| 633 |
+
<data key="e_suspicion_score">0.25</data>
|
| 634 |
+
<data key="e_mo_name">Data Theft</data>
|
| 635 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 636 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 637 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 638 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 639 |
+
<data key="e_disposition">Unprocessed</data>
|
| 640 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 641 |
+
</edge>
|
| 642 |
+
<edge id="e32" source="HOST-2865" target="b71af6f3-3a26-11ee-9a0f-3fd546fc2c4e">
|
| 643 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 644 |
+
<data key="e_timestamp">1708870403</data>
|
| 645 |
+
<data key="e_label_binary">malicious</data>
|
| 646 |
+
<data key="e_label_confidence">0.7</data>
|
| 647 |
+
<data key="e_suspicion_score">0.25</data>
|
| 648 |
+
<data key="e_mo_name">Data Theft</data>
|
| 649 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 650 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 651 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 652 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 653 |
+
<data key="e_disposition">Unprocessed</data>
|
| 654 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 655 |
+
</edge>
|
| 656 |
+
<edge id="e33" source="e64d3aa0-062d-11ee-a11e-275c53a8bf04" target="HOST-2865">
|
| 657 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 658 |
+
<data key="e_timestamp">1708870403</data>
|
| 659 |
+
<data key="e_label_binary">malicious</data>
|
| 660 |
+
<data key="e_label_confidence">0.7</data>
|
| 661 |
+
<data key="e_suspicion_score">0.25</data>
|
| 662 |
+
<data key="e_mo_name">Data Theft</data>
|
| 663 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 664 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 665 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 666 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 667 |
+
<data key="e_disposition">Unprocessed</data>
|
| 668 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 669 |
+
</edge>
|
| 670 |
+
<edge id="e34" source="HOST-2865" target="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
|
| 671 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 672 |
+
<data key="e_timestamp">1708870403</data>
|
| 673 |
+
<data key="e_label_binary">malicious</data>
|
| 674 |
+
<data key="e_label_confidence">0.7</data>
|
| 675 |
+
<data key="e_suspicion_score">0.25</data>
|
| 676 |
+
<data key="e_mo_name">Data Theft</data>
|
| 677 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 678 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 679 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 680 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 681 |
+
<data key="e_disposition">Unprocessed</data>
|
| 682 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 683 |
+
</edge>
|
| 684 |
+
<edge id="e35" source="HOST-2865" target="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7">
|
| 685 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 686 |
+
<data key="e_timestamp">1708870403</data>
|
| 687 |
+
<data key="e_label_binary">malicious</data>
|
| 688 |
+
<data key="e_label_confidence">0.7</data>
|
| 689 |
+
<data key="e_suspicion_score">0.25</data>
|
| 690 |
+
<data key="e_mo_name">Data Theft</data>
|
| 691 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 692 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 693 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 694 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 695 |
+
<data key="e_disposition">Unprocessed</data>
|
| 696 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 697 |
+
</edge>
|
| 698 |
+
<edge id="e36" source="1fe40cc1-067a-11ee-baf9-bf17bcc13fc7" target="HOST-2865">
|
| 699 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 700 |
+
<data key="e_timestamp">1708870403</data>
|
| 701 |
+
<data key="e_label_binary">malicious</data>
|
| 702 |
+
<data key="e_label_confidence">0.7</data>
|
| 703 |
+
<data key="e_suspicion_score">0.25</data>
|
| 704 |
+
<data key="e_mo_name">Data Theft</data>
|
| 705 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 706 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 707 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 708 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 709 |
+
<data key="e_disposition">Unprocessed</data>
|
| 710 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 711 |
+
</edge>
|
| 712 |
+
<edge id="e37" source="HOST-2865" target="713aaef0-2540-11ee-9ba1-a1104bd64ffa">
|
| 713 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 714 |
+
<data key="e_timestamp">1708870403</data>
|
| 715 |
+
<data key="e_label_binary">malicious</data>
|
| 716 |
+
<data key="e_label_confidence">0.7</data>
|
| 717 |
+
<data key="e_suspicion_score">0.25</data>
|
| 718 |
+
<data key="e_mo_name">Data Theft</data>
|
| 719 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 720 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 721 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 722 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 723 |
+
<data key="e_disposition">Unprocessed</data>
|
| 724 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 725 |
+
</edge>
|
| 726 |
+
<edge id="e38" source="HOST-2761" target="f79d9e50-0626-11ee-8860-f951c26910c1">
|
| 727 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 728 |
+
<data key="e_timestamp">1708870403</data>
|
| 729 |
+
<data key="e_label_binary">malicious</data>
|
| 730 |
+
<data key="e_label_confidence">0.7</data>
|
| 731 |
+
<data key="e_suspicion_score">0.25</data>
|
| 732 |
+
<data key="e_mo_name">Data Theft</data>
|
| 733 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 734 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 735 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 736 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 737 |
+
<data key="e_disposition">Unprocessed</data>
|
| 738 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 739 |
+
</edge>
|
| 740 |
+
<edge id="e39" source="f79d9e50-0626-11ee-8860-f951c26910c1" target="HOST-2761">
|
| 741 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 742 |
+
<data key="e_timestamp">1708870403</data>
|
| 743 |
+
<data key="e_label_binary">malicious</data>
|
| 744 |
+
<data key="e_label_confidence">0.7</data>
|
| 745 |
+
<data key="e_suspicion_score">0.25</data>
|
| 746 |
+
<data key="e_mo_name">Data Theft</data>
|
| 747 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 748 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 749 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 750 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 751 |
+
<data key="e_disposition">Unprocessed</data>
|
| 752 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 753 |
+
</edge>
|
| 754 |
+
<edge id="e40" source="HOST-2761" target="13dab800-0b59-11ee-bb77-15fea7d75891">
|
| 755 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 756 |
+
<data key="e_timestamp">1708870403</data>
|
| 757 |
+
<data key="e_label_binary">malicious</data>
|
| 758 |
+
<data key="e_label_confidence">0.7</data>
|
| 759 |
+
<data key="e_suspicion_score">0.25</data>
|
| 760 |
+
<data key="e_mo_name">Data Theft</data>
|
| 761 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 762 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 763 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 764 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 765 |
+
<data key="e_disposition">Unprocessed</data>
|
| 766 |
+
<data key="e_incident_id">09061110-d3e8-11ee-bf59-a9ad7cebab5f</data>
|
| 767 |
+
</edge>
|
| 768 |
+
</graph>
|
| 769 |
+
</graphml>
|
graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="de953280-ea91-11ec-90c7-eff83c975df3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.11.114</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1204.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f0028fe0-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.224</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.224</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12664" target="HOST-12764">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1657455349</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">09125650-004a-11ed-825e-31048ffbcace</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-12764" target="HOST-12664">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1657455349</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 67 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">09125650-004a-11ed-825e-31048ffbcace</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e84e5e01-067e-11ee-8a73-cf5634491628">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.76.235</data>
|
| 35 |
+
<data key="n_hostname">100.64.76.235</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5188edc0-062c-11ee-a961-f3aa8f0c341a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.114</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.114</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="b93651c0-19f9-11ee-bd35-ddd746035b48">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.76.236</data>
|
| 51 |
+
<data key="n_hostname">100.64.76.236</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="e84e5e01-067e-11ee-8a73-cf5634491628" target="HOST-14130">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1688714980</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.71875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-14130" target="e84e5e01-067e-11ee-8a73-cf5634491628">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1688714980</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.71875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="b93651c0-19f9-11ee-bd35-ddd746035b48" target="HOST-14130">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1688714980</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.71875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-14130" target="b93651c0-19f9-11ee-bd35-ddd746035b48">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1688714980</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.71875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">0912fc70-1c98-11ee-b9c1-8f183b2e0424</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a28eadc2-0350-11ed-8f2c-69edfa1d49ec">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.91.181</data>
|
| 35 |
+
<data key="n_hostname">100.64.91.181</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="38840493-0a79-11ed-8674-598372048324">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.221.82.8</data>
|
| 43 |
+
<data key="n_hostname">10.221.82.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.89453125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="a28eadc2-0350-11ed-8f2c-69edfa1d49ec" target="HOST-16884">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1660367767</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.89453125</data>
|
| 53 |
+
<data key="e_suspicion_score">0.89453125</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">091664b0-1ac7-11ed-9242-7df62b3bf04c</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|