diff --git a/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53aeedf6a240153dfb34dbf76a055a258584410e --- /dev/null +++ b/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.29 + 100.64.26.29 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.30 + 100.64.26.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.31 + 100.64.26.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.32 + 100.64.26.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719128931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08293240-3135-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml b/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c93c20b08b5b8b8c769e4ab05beab6768ce2fea7 --- /dev/null +++ b/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697389954 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 082c33f0-6b7e-11ee-8294-3ff0afe5b786 + + + diff --git a/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83b7ad314ce0ee2aa4c54b5e7f8a56d4c94278b5 --- /dev/null +++ b/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.37.13 + 172.30.37.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.216 + 100.64.95.216 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716457891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 082e2330-18ea-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 082e2330-18ea-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d276ec7cde9c95454a892b463b056fe5781dacb --- /dev/null +++ b/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.50 + 100.64.52.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 082f5100-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..498c4267984d6e4681c7669b5255891e759ce92b --- /dev/null +++ b/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.108 + 100.64.68.108 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1701812052 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08316590-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812052 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08316590-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812052 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08316590-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812052 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08316590-93b6-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bfa36c0c311f0d565288e2a02baaf491827dec1 --- /dev/null +++ b/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.36.194 + 100.64.36.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704249017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79d73b27619db26fd3c3bb7340487b2ea07494f1 --- /dev/null +++ b/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.41 + USER-0015-1222.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.148 + USER-0015-1223.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.42 + 100.64.20.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.43 + 100.64.20.43 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.45 + 100.64.20.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.46 + 100.64.20.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.47 + 100.64.20.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231234 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08359590-214a-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml b/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7e116c9fabfc851669f7ab639ea9dc8db47da73 --- /dev/null +++ b/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.93 + 100.64.13.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699508232 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0837e4a0-7ec2-11ee-a53e-810a167207be + + + diff --git a/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml b/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1eb836669e5d0463183e1ba710b60a52fcc59b6c --- /dev/null +++ b/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697389954 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 083a3db0-6b7e-11ee-8294-3ff0afe5b786 + + + diff --git a/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ef1c7fbfcb67e012ed8c7ceb90ff1a72b226474 --- /dev/null +++ b/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.8.190 + 172.16.8.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.74 + 100.64.87.74 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716457891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 083e4fd0-18ea-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 083e4fd0-18ea-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2db40296e4c1a07b52820f8a27cdf5a4405bb17 --- /dev/null +++ b/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.142 + 100.64.94.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.190.96.179 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1704249017 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08432290-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml b/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40e73392b8df57df76c3142cff32a4373e28a297 --- /dev/null +++ b/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.93 + 100.64.13.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699508232 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 084fd970-7ec2-11ee-a53e-810a167207be + + + diff --git a/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00ab92921203f7eaab820d93fbedcbb3bbe2f87a --- /dev/null +++ b/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.142 + 100.64.94.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704249017 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 085523f0-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc3b41eba33d09372c634f6dfa91596dbc7145b3 --- /dev/null +++ b/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.164 + USER-0015-1393.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0865f080-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c170a1e372e5839cc646e122ba430595d8a2c753 --- /dev/null +++ b/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.248 + 100.64.40.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 086fb180-61fa-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7fae7201c18740e436918844bcfe19e7f583860 --- /dev/null +++ b/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285753 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0870a540-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1312c3f77236a3292bdae935b17c991a439b6da6 --- /dev/null +++ b/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.248 + 100.64.40.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696343700 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 087e3070-61fa-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml b/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4de1a9f07a6e21603af1d7f589f770e3dacf5673 --- /dev/null +++ b/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658505468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088165f0-09d7-11ed-b518-5f11683c5c90 + + + INCIDENT_LINK + 1658505468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088165f0-09d7-11ed-b518-5f11683c5c90 + + + diff --git a/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33006cd402da7a858ade50a04bc22b1ab7b2c9e2 --- /dev/null +++ b/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.255 + 100.64.71.255 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.82.187 + 100.64.82.187 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1666301693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08820df0-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08820df0-50bf-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8b240665be8c23cb2d644f753cff0f875a83f77 --- /dev/null +++ b/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.113 + 100.64.59.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08871f20-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35ec25b6a7933c8dc1b75da92f2465ba0f94fd18 --- /dev/null +++ b/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.250 + 100.64.40.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088b76e0-61fa-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088b76e0-61fa-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088b76e0-61fa-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088b76e0-61fa-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696343700 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 088b76e0-61fa-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8daf6305221ade287ea3d17d17bdb8009639f9a --- /dev/null +++ b/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.14 + 100.64.2.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.54 + 100.64.13.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.98 + 100.64.55.98 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.3 + 100.64.13.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.225 + 100.64.56.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.181 + 100.64.20.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.226 + 100.64.56.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.114 + 100.64.37.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.56.227 + 100.64.56.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.228 + 100.64.56.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835121 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08921200-1340-11ef-90d6-79b9e3bf2217 + + + diff --git a/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc6068a118defdbda39291fb8f4856eb71f74368 --- /dev/null +++ b/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.32 + 100.64.80.32 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + 100.64.1.158 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08a25fb0-ee31-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08a25fb0-ee31-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml b/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75d1b59a06f43220453d65610e7c04a8184d087c --- /dev/null +++ b/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.106 + 100.64.73.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.182 + 100.64.76.182 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.200 + USER-0015-1793.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.124 + 100.64.71.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.2.213 + USER-0015-1421.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + INCIDENT_LINK + 1655116309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94 + + + diff --git a/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39aba53c64bcdaa7069125f94b416bbd61e18470 --- /dev/null +++ b/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.121 + 100.64.50.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708379488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b3a8b0-cf71-11ee-9f4f-f950118d6926 + + + diff --git a/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37a31d702435bfdba81cae10f1919fc4410d399e --- /dev/null +++ b/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.239 + 100.64.26.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.247 + 100.64.62.247 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.248 + 100.64.62.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.249 + 100.64.62.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.250 + 100.64.62.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.109 + 100.64.8.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.230 + 100.64.7.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.196 + 100.64.35.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.84 + 100.64.14.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048602 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b58040-4402-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f225da41590d82cadaddd20ee6bf29b2e093696 --- /dev/null +++ b/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.192 + 100.64.32.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694332797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08b71a40-4fb0-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6762c31fe0e37b502104e8733e44b230f87864c7 --- /dev/null +++ b/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.200 + 100.64.44.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.245 + 100.64.76.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.15.138 + 100.64.15.138 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687085469 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08baa740-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085469 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08baa740-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085469 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08baa740-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085469 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08baa740-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bce31a082f654c95f20487811b3e7b8db9d9241 --- /dev/null +++ b/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.213 + 100.64.45.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000692 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08bcb5c0-fad0-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9a7bbcba1f6470f734add3e734d6a29975ed9ac --- /dev/null +++ b/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.50.40 + 192.168.50.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.49 + 100.64.83.49 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688041100 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08c128e0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041100 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 08c128e0-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b30f45764295dffa900b4cb15381e8744a493b0f --- /dev/null +++ b/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.121 + 100.64.50.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708379488 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08c498a0-cf71-11ee-9f4f-f950118d6926 + + + diff --git a/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d6ab1d49b84179bdc1669553d981ceac9a81ea4 --- /dev/null +++ b/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.192 + 100.64.32.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694332797 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08c5c040-4fb0-11ee-bb6d-6beb4ab99de5 + + + diff --git a/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c208480eb67f50c1148b102b74c68196ff777a22 --- /dev/null +++ b/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689980277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 08cbd1a0-281a-11ee-b06f-b17f5f626799 + + + diff --git a/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05056e511120ab5426b0f37fd8dea4e3ff6cdb5b --- /dev/null +++ b/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708379488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 08d22d30-cf71-11ee-9f4f-f950118d6926 + + + diff --git a/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cbcd0cfb6257674a26f1ea9c1223ae1a8cf83c5 --- /dev/null +++ b/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.31.25 + 100.64.31.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704249018 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08dcf190-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9037363491c7018bcbc992afa05ea0d16ea499e --- /dev/null +++ b/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.108 + 100.64.92.108 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678001184 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e18730-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53592bdfa7105b1ab9dee7558cd886ac95dd327e --- /dev/null +++ b/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.166 + 100.64.51.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e3d310-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f21c276a9aefc55d178348a7e97f5c5dce76e99c --- /dev/null +++ b/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.125 + 100.64.17.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.21.1 + 100.64.21.1 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.190 + 100.64.70.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e53880-dfa2-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52013ec0b7a35c075fa1cf103e23e18d5bfe65e7 --- /dev/null +++ b/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.108 + 100.64.92.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678001184 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08e88c10-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42407024b5b48e0821767322a0c4d7f45e0ee489 --- /dev/null +++ b/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.218 + 100.64.95.218 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716457892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08e95ce0-18ea-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcc212b6734d6af63a9a66c74e04e571524b4f0c --- /dev/null +++ b/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.168 + 100.64.35.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08ea8430-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..897736a025973a983bc825c5de42a358aaa0ec2e --- /dev/null +++ b/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.110 + 100.64.92.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678001184 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08eaaef0-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa3e2d52e60268252d5981d9e201c52091162c30 --- /dev/null +++ b/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.110 + 100.64.92.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678001184 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08ede340-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef12d01a1a817d4750312129f519d642e9e55a2f --- /dev/null +++ b/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.123 + 100.64.50.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708379488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 08f23850-cf71-11ee-9f4f-f950118d6926 + + + diff --git a/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3309d7d3e74667c5d26ded478a7cba9952cdd096 --- /dev/null +++ b/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.166 + 100.64.51.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851574 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 08f670b0-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a0d6221a43f483046e6e8a1a6823ca091b9205a --- /dev/null +++ b/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.95.218 + 100.64.95.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716457892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 090410d0-18ea-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e1602d2dc11949912a73b76f1307dac69550447 --- /dev/null +++ b/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.106 + 100.64.8.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.107 + 100.64.8.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.108 + 100.64.8.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.109 + 100.64.8.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.111 + 100.64.8.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.113 + 100.64.8.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.114 + 100.64.8.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.115 + 100.64.8.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.116 + 100.64.8.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.117 + 100.64.8.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.118 + 100.64.8.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.119 + 100.64.8.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.121 + 100.64.8.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.122 + 100.64.8.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870403 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09061110-d3e8-11ee-bf59-a9ad7cebab5f + + + diff --git a/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml b/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5733a069dcc42576aaa72eb890b5fe85f93897d9 --- /dev/null +++ b/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657455349 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09125650-004a-11ed-825e-31048ffbcace + + + INCIDENT_LINK + 1657455349 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09125650-004a-11ed-825e-31048ffbcace + + + diff --git a/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39c42e744e01fa7fd0549700640e9268714c9f1f --- /dev/null +++ b/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.235 + 100.64.76.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.236 + 100.64.76.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688714980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0912fc70-1c98-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0912fc70-1c98-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0912fc70-1c98-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0912fc70-1c98-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8c565fe4b756c2c3e4c9796245ff8a4f74722f0 --- /dev/null +++ b/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.181 + 100.64.91.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660367767 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 091664b0-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..478a93907ce58d84397d356969beb661b0c5f7e4 --- /dev/null +++ b/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.144 + 100.64.94.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1704249018 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09169f30-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c50c3f4649c3337b5582fbcff4a0bf18c53279e5 --- /dev/null +++ b/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.181 + 100.64.91.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660367767 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0921d660-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f74ef4f1933ae66667d1f52836402d9489f79504 --- /dev/null +++ b/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.27.224 + 100.64.27.224 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.225 + 100.64.4.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.207 + 100.64.93.207 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720052 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09264680-2d7d-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2b5c3bdc3509755f59f89b6e84554be0a7cf04a --- /dev/null +++ b/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717918181 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0928e4f0-2632-11ef-bbd8-ff4fc7f3a856 + + + diff --git a/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7d79d9f9c37e240ea353a8726bd2f2b9f66fe34 --- /dev/null +++ b/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.144 + 100.64.94.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1704249018 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 092c7120-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml b/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cac6c53884c6e83ff82868bd9964b6da8f681fa3 --- /dev/null +++ b/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.169 + USER-0015-1299.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.170 + 100.64.33.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.67 + 100.64.8.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + INCIDENT_LINK + 1694274816 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 093696d0-4f29-11ee-8f95-3f205431a8e8 + + + diff --git a/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4227c2a7eb86ff9fae754237a1819c3fa50b0798 --- /dev/null +++ b/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.202 + 100.64.57.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0941b0e0-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7aa74750b85a9caef1d26a5d20d3fe70204e6c6f --- /dev/null +++ b/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.78 + 100.64.68.78 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.42.4 + 100.64.42.4 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09474a00-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09474a00-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09474a00-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09474a00-70e6-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af735d38ab82c0ab4c35efec124951b358fc8d72 --- /dev/null +++ b/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.114 + 100.64.64.114 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09483460-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984379 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09483460-70e6-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4044012975449cdd7c789b7c5e48cb14a949980d --- /dev/null +++ b/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.202 + 100.64.57.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0950a500-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d4a5afbdecf0069e9b5e582c97ed623bffbe7c8 --- /dev/null +++ b/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692902574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09532250-42ae-11ee-912e-5fdb65c11aab + + + diff --git a/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bbba9900e5c9f87e675ea1640b8ecb5f6f14a96 --- /dev/null +++ b/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.26 + 100.64.31.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702790448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0954fce0-9c9c-11ee-aed3-e3a8c1c11880 + + + diff --git a/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4faf8ce1d763c45f0280fbdfc559dedc114a7aed --- /dev/null +++ b/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.216 + 100.64.94.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.217 + 100.64.94.217 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.218 + 100.64.94.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.219 + 100.64.94.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.220 + 100.64.94.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.221 + 100.64.94.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.222 + 100.64.94.222 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.223 + 100.64.94.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.224 + 100.64.94.224 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.225 + 100.64.94.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.226 + 100.64.94.226 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.1 + 100.64.13.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.227 + 100.64.94.227 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.242 + 100.64.90.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.228 + 100.64.94.228 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.229 + 100.64.94.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575283 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09554600-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04609318d78237cc5ce826585f9effce9676286a --- /dev/null +++ b/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.92 + 100.64.21.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0955c750-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f33bca8381459b669c2b87a7d79ed66c1c09e03 --- /dev/null +++ b/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.204 + 100.64.57.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285754 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09605c70-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc1c9fc36d71bf2cd24102b3b5c0060368ff8ac3 --- /dev/null +++ b/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.52 + 100.64.63.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1704249019 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml b/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d92faba2a62b48f08526271d2fd1b1750690d96 --- /dev/null +++ b/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.200 + USER-0015-1793.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.26.101 + 100.64.26.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.194 + 100.64.78.194 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657455350 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09646df0-004a-11ed-825e-31048ffbcace + + + INCIDENT_LINK + 1657455350 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09646df0-004a-11ed-825e-31048ffbcace + + + INCIDENT_LINK + 1657455350 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09646df0-004a-11ed-825e-31048ffbcace + + + INCIDENT_LINK + 1657455350 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09646df0-004a-11ed-825e-31048ffbcace + + + diff --git a/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14563e09461b0a17a4a8962654c2fb5201448144 --- /dev/null +++ b/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.111 + USER-0015-2048.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + HOST-17989 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.182 + 100.64.90.182 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720389076 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09654280-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389076 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09654280-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389076 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09654280-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389076 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09654280-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40ab7329d3cee15eabeec72092ad0e155cef09a7 --- /dev/null +++ b/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692902574 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0966aa50-42ae-11ee-912e-5fdb65c11aab + + + diff --git a/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4efbdaf1f60a0319c3e9c65c11e95327fb30aa8f --- /dev/null +++ b/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.92 + 100.64.21.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521126 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 096a39b0-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a52f8ee3ecc18e021ecc8b317e476740ac255ea6 --- /dev/null +++ b/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.63.52 + 100.64.63.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704249019 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0975d630-a9e0-11ee-ad25-ed0dad3b42f5 + + + diff --git a/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml b/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c41f52654e212c9259b42a84761ba83c47a11c80 --- /dev/null +++ b/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.117 + 100.64.59.117 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690123301 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09775590-2967-11ee-80bc-6f53269df3bb + + + diff --git a/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8344303c17201e318fe016952f2012d7fa674c7d --- /dev/null +++ b/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.125 + 100.64.65.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689980279 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09855da0-281a-11ee-b06f-b17f5f626799 + + + diff --git a/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b939e166f6829634ff1904473f1b13a7c45fa8e --- /dev/null +++ b/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.210 + 100.64.93.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0988df40-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml b/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f08c2f7ac874ab38989a25cf3b6db70089600f66 --- /dev/null +++ b/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.117 + 100.64.59.117 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690123301 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 098a4150-2967-11ee-80bc-6f53269df3bb + + + diff --git a/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52b9c9a585fcac0dd82c8f01bcddbf1f5ba9783e --- /dev/null +++ b/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892862 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 098b71b0-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a776d07381ba2f9ad7716b6be4df64e73e9a9068 --- /dev/null +++ b/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.168 + 100.64.51.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 098e9200-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dc65310ea391126dbc52db1583ca51ce46d99c4 --- /dev/null +++ b/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.210 + 100.64.93.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 098ef9c0-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd03f6b9fe1c6ea0c37eec1c60ed21e4e009e050 --- /dev/null +++ b/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.144 + 100.64.8.144 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.145 + 100.64.8.145 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.146 + 100.64.8.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.147 + 100.64.8.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.148 + 100.64.8.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.149 + 100.64.8.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.151 + 100.64.8.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.152 + 100.64.8.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.60 + 100.64.6.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.154 + 100.64.8.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.155 + 100.64.8.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.156 + 100.64.8.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + INCIDENT_LINK + 1708870404 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09944750-d3e8-11ee-bf59-a9ad7cebab5f + + + diff --git a/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba74c6273f443bc3115847ddd75e0dfee82f6ff3 --- /dev/null +++ b/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.212 + 100.64.93.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 099625b0-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98f3b1f188f1b7e36bc9d2e30e6d6bb2c94beb31 --- /dev/null +++ b/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.112 + USER-0015-1331.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690112564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 099ee420-294e-11ee-b379-83a6d20dc4b8 + + + diff --git a/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aaa22197b1b8c1f80348514b17ff8a5c31049eab --- /dev/null +++ b/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892862 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09a00b20-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..534376c18df42cce83d59c7c699b147f9cf05b72 --- /dev/null +++ b/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.168 + 100.64.51.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09a1a4d0-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ee4f40b6974ee132a630d01966b823120296bfc --- /dev/null +++ b/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.212 + 100.64.93.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09a87530-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1e0d4a9080b7b9d9e9c25306642cac7b9afa27b --- /dev/null +++ b/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.112 + 100.64.73.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.123 + 100.64.78.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09ace7d0-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09ace7d0-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09ace7d0-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09ace7d0-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abab1f114de72651f72f0de965c831eff63d9ca9 --- /dev/null +++ b/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.1 + 100.64.51.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09ad0910-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ace73177eafac49f57ce78b2e793cc144770c1c --- /dev/null +++ b/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.170 + 100.64.51.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09b309f0-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d066f044340f0cde689a32b4eaa2c33291dfa442 --- /dev/null +++ b/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.1 + 100.64.51.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09b45c10-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf3163e75b0f0fb9c78a9a8bf6b83d9dc47d9368 --- /dev/null +++ b/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.112 + USER-0015-1331.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690112564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09b615a0-294e-11ee-b379-83a6d20dc4b8 + + + diff --git a/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dce51536d084f80350d42f6b2d6191028f720bda --- /dev/null +++ b/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.170 + 100.64.51.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714851576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09c3abc0-0a4e-11ef-96bf-b7c516f33db0 + + + diff --git a/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..992826a100cb458e28c23c020ae111389569d86d --- /dev/null +++ b/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.108 + 100.64.49.108 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09c82c90-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fef4092a970be1645684838c01679f449c48a62e --- /dev/null +++ b/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.254 + 100.64.94.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.255 + 100.64.94.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.1 + 100.64.95.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.1 + 100.64.95.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.2 + 100.64.95.2 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.3 + 100.64.95.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.4 + 100.64.95.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.5 + 100.64.95.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.6 + 100.64.95.6 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.7 + 100.64.95.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.78.205 + 100.64.78.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.8 + 100.64.95.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09cdd160-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fd3849fc6af5e37c9109814b07a624404309e8e --- /dev/null +++ b/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.47 + 100.64.33.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690112564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09d117b0-294e-11ee-b379-83a6d20dc4b8 + + + diff --git a/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ca2a7a67539d990aa0b7248ecb6064848d9b92b --- /dev/null +++ b/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712293923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09d1ac70-f30b-11ee-9a5d-cb0254535644 + + + diff --git a/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cfafd6288c077983d3f0bac1bf141a2af90eca8 --- /dev/null +++ b/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.124 + 100.64.78.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09d4e230-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09d4e230-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09d4e230-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670660 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09d4e230-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b043e8adeb2663a0d166afec8b4275fc40ce1acf --- /dev/null +++ b/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.155 + 100.64.14.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09d53ab0-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeb843fb8730a7a283d47327b9af075409375e71 --- /dev/null +++ b/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.108 + 100.64.49.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09d5c120-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7477cc022e0e2fcbdae196ef4970ee14597a4bf5 --- /dev/null +++ b/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.155 + 100.64.14.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09e455e0-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7aed41f5a99ac6ceb6ca2c8be0c13f6f9ad1d4d4 --- /dev/null +++ b/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.110 + 100.64.49.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 09e52a70-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af062585d64a67c2e7bcd4a1e60b03f805aa3c12 --- /dev/null +++ b/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.176 + 100.64.11.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09f19c50-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e214084ce8e13aeb4a81564d464b7836e1ccfdfa --- /dev/null +++ b/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,805 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.79 + 100.64.61.79 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.132 + 100.64.35.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.80 + 100.64.61.80 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.46 + 100.64.61.46 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.224 + 100.64.27.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.37 + 100.64.61.37 + ["Exploiting Target","Exploiting Host"] + 0.9071875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.38 + 100.64.61.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.144 + 100.64.15.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.39 + 100.64.61.39 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.121 + 100.64.6.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.81 + 100.64.61.81 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.71 + 100.64.38.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.10 + 100.64.12.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.172 + 100.64.30.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.124 + 100.64.11.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.82 + 100.64.61.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.68 + 100.64.22.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695998387 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 09f27140-5ed6-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9e9fe12962ed1175b12a06e1ca7d320d1882b04 --- /dev/null +++ b/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90f6f04f16f717dedfcd3e2f84fc3d851b541859 --- /dev/null +++ b/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.220 + 100.64.30.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 09f6cf40-7a7b-11ee-80a6-c94063211ff4 + + + diff --git a/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3a0b1f6a3632827d4a466124f8bba81566fe2ce --- /dev/null +++ b/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.32 + 100.64.12.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a013df0-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62f2618b81a4206e24d1ad8b89f1feb74d313277 --- /dev/null +++ b/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.176 + 100.64.11.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a017ad0-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53dc486804d956e5d36bcff8f4d4d3a69d0398c4 --- /dev/null +++ b/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.220 + 100.64.30.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a065fa0-7a7b-11ee-80a6-c94063211ff4 + + + diff --git a/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc4e095a6180dff055295110e7aef0bccc3446be --- /dev/null +++ b/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a069bd0-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea85778b70b8b96ccf7cc0f8d28da0d2478beedb --- /dev/null +++ b/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,423 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.230 + 100.64.10.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.232 + 100.64.10.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.233 + 100.64.10.233 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.234 + 100.64.10.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.236 + USER-0015-1194.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.237 + 100.64.10.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.238 + 100.64.10.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001200 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a0962d0-a79f-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef2054073855156b3299e913b9d700f523841035 --- /dev/null +++ b/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.32 + 100.64.12.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d98390a834fd0d202bf12ec695484acc784aef9 --- /dev/null +++ b/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.63 + 100.64.68.63 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.16.70 + 100.64.16.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1687408453 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a119200-10b6-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408453 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a119200-10b6-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408453 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a119200-10b6-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408453 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a119200-10b6-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7aa843c8d57279174bb918148edf319be5d53ba --- /dev/null +++ b/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.161 + 100.64.66.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a12bbb0-7a7b-11ee-80a6-c94063211ff4 + + + diff --git a/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d4c40e485cd0c297b6802618c918a0b956956d6 --- /dev/null +++ b/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.175 + 100.64.26.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a142ba0-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49d52d490ae838fdc08a47743b7852ec1a2fc068 --- /dev/null +++ b/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678309994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a169510-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ff0234467df8237178ecb0b6c100201577f4366 --- /dev/null +++ b/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.195 + 100.64.89.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678309994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a19f070-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc1e2829efc3d09ed6d6e5845258e98c0a5dc079 --- /dev/null +++ b/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.195 + 100.64.89.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678309994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a1ef980-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..313945d8755cac6055ffdb57c7f169d5084b272f --- /dev/null +++ b/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.161 + 100.64.66.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699037936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a1fb400-7a7b-11ee-80a6-c94063211ff4 + + + diff --git a/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d978831f39b5a7c04f7a16d06902f3963b63eab1 --- /dev/null +++ b/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.194 + 100.64.11.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a201090-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be4430174a669020fb311226da3adba733e46204 --- /dev/null +++ b/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,215 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.97 + 100.64.59.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.196 + 100.64.16.196 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a239110-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e1d897b3b0489a1690b73b1efb31fbd45f18f3c --- /dev/null +++ b/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.175 + 100.64.26.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516174 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a23e310-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3bcc28c44218d2a5d464c8aafd44ef6a42bb92a8 --- /dev/null +++ b/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.194 + 100.64.11.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694892863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2506bc59d1199d42eb1c419f510687ef0af2a5ac --- /dev/null +++ b/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,619 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.206 + 100.64.57.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.207 + 100.64.57.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.208 + 100.64.57.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.209 + 100.64.57.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.190 + 100.64.18.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.179 + 100.64.17.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.210 + 100.64.57.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.88 + 100.64.18.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.60 + 100.64.18.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.211 + 100.64.57.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.142 + 100.64.21.142 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699285756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e65a4ad481681569fa4851266c8e58af6b6f6cfe --- /dev/null +++ b/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.188 + 100.64.84.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678309994 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a3a49b0-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a949707c4aaa7ffc65239ec2a62a4c3b7139614 --- /dev/null +++ b/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.136 + 100.64.24.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.137 + 100.64.24.137 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1713583702 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a3e7870-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583702 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a3e7870-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583702 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a3e7870-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583702 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a3e7870-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5fd17498a849620f8cafaee9bb8f43735d014d3 --- /dev/null +++ b/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.84.188 + 100.64.84.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678309994 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a3f04a0-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee3308da111b8a6fe16294a870ef20052730aa77 --- /dev/null +++ b/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml @@ -0,0 +1,635 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.163 + 100.64.66.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.164 + 100.64.66.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.36 + 100.64.18.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.165 + 100.64.66.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.166 + 100.64.66.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.167 + 100.64.66.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.168 + 100.64.66.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.7 + 100.64.25.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.169 + 100.64.66.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.170 + 100.64.66.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.247 + 100.64.20.247 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + INCIDENT_LINK + 1699037936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a4cde80-7a7b-11ee-80a6-c94063211ff4 + + + diff --git a/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fed6a362802c0531f2ebd2c6beb4ec50ea8e9af9 --- /dev/null +++ b/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.179 + 100.64.12.179 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129121 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0a522f30-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9055c4e6ab5d7edc97ecd46c176491af07758ab6 --- /dev/null +++ b/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.50 + 100.64.83.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.38.61 + 100.64.38.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688041102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a5891c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a5891c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a5891c0-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a5891c0-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1bf551b35d20a6cfaf704b6d6aac3ce03617892 --- /dev/null +++ b/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.232 + 100.64.36.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690112565 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a662bc0-294e-11ee-b379-83a6d20dc4b8 + + + diff --git a/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..479538749e068da8b2c08328cd20d71e3ff8e1cc --- /dev/null +++ b/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.50 + 100.64.30.50 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699355 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a6bfd40-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699355 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a6bfd40-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df7805dcded04e54c99fc94ae940abefaa102556 --- /dev/null +++ b/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193705 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0a715d70-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml b/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a93fcf9a1d5f24aaa5880a91c17da17060b6f343 --- /dev/null +++ b/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690015928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a78cfa0-286d-11ee-a80a-874bd8e06d7d + + + diff --git a/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daf4221b77df0bde102724653c44fc759a32dba7 --- /dev/null +++ b/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.250 + 100.64.79.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685771212 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a8ac2d0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771212 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a8ac2d0-01d2-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d2882d2aa45b18c088ace3cfe5046402ea6dba9 --- /dev/null +++ b/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.184 + 100.64.97.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1714636399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a8e1550-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a8e1550-0859-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58b8fb386f8f9ed0135dbdb05a8516c47686b89e --- /dev/null +++ b/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.249 + 100.64.44.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685562477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a8f94a0-ffec-11ed-97eb-05d23f72b81e + + + diff --git a/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ef69dc72fa512fa99fab37bc30a0c4d27695d3e --- /dev/null +++ b/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.104 + 100.64.77.104 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.105 + 100.64.77.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664557939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb + + + INCIDENT_LINK + 1664557939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb + + + diff --git a/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2e424a9249a430d10bb0d25fc42a809eb756092 --- /dev/null +++ b/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.251 + 100.64.20.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.252 + 100.64.20.252 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.253 + 100.64.20.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.254 + 100.64.20.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.1 + 100.64.21.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.1 + 100.64.21.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.2 + 100.64.21.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.3 + 100.64.21.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.4 + 100.64.21.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.15 + 100.64.11.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.5 + 100.64.21.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.6 + 100.64.21.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.7 + USER-0015-1226.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.184 + 100.64.5.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.167 + 100.64.16.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a941010-df99-11ee-b293-9383286c6129 + + + diff --git a/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3038ce2c87829365d8d0923a34af1e5be5f3883 --- /dev/null +++ b/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.22 + 100.64.8.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0a9b97f0-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b77f647aeb6cbe80b890a10f460364584ec2217a --- /dev/null +++ b/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.181 + 100.64.12.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0aaad680-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85ac50eed597ee3c5ea4abf1148fe0f21212b59e --- /dev/null +++ b/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.22 + 100.64.8.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504599 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0aabc490-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b1c9faf6c4f62d3ec504285ce99bbf6cb56d059 --- /dev/null +++ b/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.203 + 100.64.12.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684997689 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0ab41d20-fac9-11ed-ace2-756da26201e9 + + + diff --git a/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdb605042c3df7ea3eaa3d3722938fdb4e1b6f1a --- /dev/null +++ b/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.251 + 100.64.20.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710155889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0ab4de80-df99-11ee-b293-9383286c6129 + + + diff --git a/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5ce3209d9666b582ca437b17a435d5fa61a1272 --- /dev/null +++ b/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.210 + 100.64.17.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690052 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ab6fc40-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1339ee8050280269e1529cb18ee8ef3b3c2395de --- /dev/null +++ b/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.159 + 100.64.14.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0abbf130-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..206f2da86c2e2413c4dd18261e89c32bce3c9848 --- /dev/null +++ b/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.243 + 100.64.56.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193706 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ac6f780-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df99eeb01c5b298d757528a3838a332b19e9dff5 --- /dev/null +++ b/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.30 + 100.64.14.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710155890 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0acbe8f0-df99-11ee-b293-9383286c6129 + + + diff --git a/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea6ff81409af077fc9e545b81e4ea17bf94b5b35 --- /dev/null +++ b/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.203 + 100.64.12.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684997689 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0aceaa00-fac9-11ed-ace2-756da26201e9 + + + diff --git a/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc97efb8bd9d6ba660b0400faa425ffb47cb5974 --- /dev/null +++ b/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475393 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0acecdd0-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9d43d721b8b1a766e615cb5290339dde5680841 --- /dev/null +++ b/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.212 + 100.64.17.212 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690052 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0ad42130-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efc02d8ae441e12b7cd12dad619440dd4e7c023a --- /dev/null +++ b/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.170 + USER-0015-1306.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121225 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ad56440-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c83be402041ad1f7af774a3cd03df58e3ffc2108 --- /dev/null +++ b/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.198 + 100.64.41.198 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0adbc620-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f071525368e7fb839969df0909768804a83f2fe5 --- /dev/null +++ b/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.186.20 + USER-0015-1825.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"] + + + HOST + 100.64.79.232 + 100.64.79.232 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1669680547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0ae3ade0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0ae3ade0-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2248bfe9019e906c9199a15d2d001ae890bb40f9 --- /dev/null +++ b/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.243 + 100.64.56.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193706 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0ae68d70-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04b7435425afdc792618641f173bbd66d87eca60 --- /dev/null +++ b/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.170 + USER-0015-1306.example.internal + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121225 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0ae828f0-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87b333c32d191cecfb062f94046dd0a2cbc2a285 --- /dev/null +++ b/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.198 + 100.64.41.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475394 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0ae90c90-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a921eaf6228e96f96c46a7e7bc8e3e9d6c2dd889 --- /dev/null +++ b/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.180 + 100.64.17.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121225 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0af56f60-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6a7025411b79a4f1677fecbad98768ce41d9d68 --- /dev/null +++ b/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.126 + 100.64.48.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702244990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0af667f0-97a6-11ee-964e-058a4cfd3ea1 + + + diff --git a/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml b/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ef35fbc627f65b967bfb47e5d443dcd6cba8b68 --- /dev/null +++ b/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.84 + 100.64.68.84 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1703974573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0aff64c0-a761-11ee-a460-75da98a68a7c + + + diff --git a/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f631c77fe7f6a982a61f08fa9c0f2a339921928e --- /dev/null +++ b/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.183 + 100.64.12.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129122 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0b010cd0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78329a27ee691b6f8018bd26223f089415ed2c1b --- /dev/null +++ b/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.180 + 100.64.17.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121225 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b0526d0-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml b/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fa1fca6c1ad6b91e041d292188d29321fb0b866 --- /dev/null +++ b/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.84 + 100.64.68.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703974573 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b07f040-a761-11ee-a460-75da98a68a7c + + + diff --git a/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..115366301bab0a0d62668aad224f76c30884927b --- /dev/null +++ b/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193706 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0b100e70-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52aabd093630d67914147d44b272e0bcdb6871ad --- /dev/null +++ b/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696858242 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b2224f0-66a8-11ee-8819-db4d49a98ea0 + + + diff --git a/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd73a2f19dac8e150cb5a60355dd8dcaac4161f8 --- /dev/null +++ b/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712293925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0b26dc30-f30b-11ee-9a5d-cb0254535644 + + + diff --git a/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a0213785f3b4d80204609f5af64105129bc07e8 --- /dev/null +++ b/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696858242 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b31dc60-66a8-11ee-8819-db4d49a98ea0 + + + diff --git a/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..347cfc0825d57b2fd611975c1b3dce66e0b649d0 --- /dev/null +++ b/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.216 + 100.64.57.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c73492b9ab06d5ae539a7bb39f7d177a6d4f6e06 --- /dev/null +++ b/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.33 + 100.64.1.33 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.210 + 100.64.82.210 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.82.211 + 100.64.82.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.212 + 100.64.82.212 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.134 + 100.64.77.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b3ce000-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3227c0fe44c2027d34c9f8487e9e8739cca9a7d5 --- /dev/null +++ b/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.94 + 100.64.21.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b436680-f51c-11ee-a3ea-3503a39e6b10 + + + INCIDENT_LINK + 1712521129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b436680-f51c-11ee-a3ea-3503a39e6b10 + + + INCIDENT_LINK + 1712521129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b436680-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b75fbc3505a2eec346fbb805edc9037ac6529435 --- /dev/null +++ b/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.216 + 100.64.57.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699285758 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b4a0400-7cbc-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0e3b16f10a5eae3cb7c140ace0aa157fa062f84 --- /dev/null +++ b/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.125 + 100.64.78.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b4b0770-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad1ea4c82b4a58dc3ae7c3ef7e8bd8b7d30e3ac2 --- /dev/null +++ b/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.68 + 100.64.40.68 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0b4b77e0-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c554a2bdecdeef5ab581869ba6aea23c769006eb --- /dev/null +++ b/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.220 + 100.64.95.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1716457896 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b4e7600-18ea-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29f3e0ed10b798560866e43dc39fb4bdb5ab5e37 --- /dev/null +++ b/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.185 + 100.64.12.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129123 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b5176c0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21d32475e613273ead8ac14dc0b5aecf946175e2 --- /dev/null +++ b/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.77 + USER-0015-1276.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193707 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b535900-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fe72674b28258c7a4ac1faa73952770cda1e59e --- /dev/null +++ b/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.68 + 100.64.40.68 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0b5a44f0-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35b38cb072a6879d20feec51d094e730c48c7b79 --- /dev/null +++ b/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.125 + 100.64.78.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670663 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b5fc7f0-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d57f68720e7c971719a0cd4cd5b1266a776d0a3f --- /dev/null +++ b/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.185 + 100.64.12.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129123 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b61a360-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9caae45733180ad19335fe88a9a157b7088d145 --- /dev/null +++ b/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.126 + 100.64.78.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b6e46e0-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..336631a638cc5ef1f5e5dff94245de52ff348f54 --- /dev/null +++ b/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.94 + 100.64.28.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709861685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b747c40-dcec-11ee-a882-b9479a05bea4 + + + diff --git a/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce2e6a3bae7ebe67c5857f3c06b80e271054d9c1 --- /dev/null +++ b/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.187 + 100.64.12.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129123 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0b7af7c0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1e97bb9cd7d81f38ae25faf3cfd432178f4f7d6 --- /dev/null +++ b/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.78.126 + 100.64.78.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670663 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b835580-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7040091fff7bd8fdba53634100e5a18cbedd4d5e --- /dev/null +++ b/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.94 + 100.64.28.94 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709861685 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b845ac0-dcec-11ee-a882-b9479a05bea4 + + + diff --git a/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a362e735e615002ae2799defae85b258826431b --- /dev/null +++ b/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.112 + 100.64.41.112 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1692003641 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b8805c0-3a81-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692003641 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b8805c0-3a81-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..931cba9f712b258be66e639f512e48d33e66f281 --- /dev/null +++ b/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.187 + 100.64.12.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129123 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b8a8820-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54e819272e86a371c29de90727fcdb187314993b --- /dev/null +++ b/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.75 + 100.64.21.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193707 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b8e1810-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml b/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2feaf19ce1ecba0bcdba6f92f91dd2d6d18299c1 --- /dev/null +++ b/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.85 + 100.64.47.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711209446 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b911910-e92e-11ee-94d2-69297fe1125f + + + INCIDENT_LINK + 1711209446 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b911910-e92e-11ee-94d2-69297fe1125f + + + diff --git a/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc4588256375364bd3ad2b1eb24adfe4753471c6 --- /dev/null +++ b/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.96 + 100.64.28.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709861686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b926480-dcec-11ee-a882-b9479a05bea4 + + + diff --git a/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f4f90356035b2fea9342382f356f3eebda9b9ca --- /dev/null +++ b/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.112 + 100.64.92.112 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.113 + 100.64.92.113 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.81.13 + 100.64.81.13 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.114 + 100.64.92.114 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + INCIDENT_LINK + 1678001189 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0b99c960-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce727cc2be3e1cb01da71935c5eec2c08f1b3ba7 --- /dev/null +++ b/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.112 + 100.64.92.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678001189 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a849bb04eb21c715ba7f81240caaa6964ed54204 --- /dev/null +++ b/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.201 + 100.64.24.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0ba06110-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1f91693d819df9761117a78ffdb801abdeb4f4c --- /dev/null +++ b/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.95 + 100.64.20.95 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717635147 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0baa3110-239f-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b74c71e92e8a82e6ca1fbdd91157bfbce9a4af05 --- /dev/null +++ b/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.98 + 100.64.28.98 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709861686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bb18540-dcec-11ee-a882-b9479a05bea4 + + + diff --git a/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0da24119f82570b269e3d129d94171c413cc76b --- /dev/null +++ b/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.57 + 100.64.20.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.58 + 100.64.20.58 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.59 + 100.64.20.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.60 + USER-0015-1224.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.102 + 100.64.17.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231240 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bb8c8e0-214a-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5e0bd70af3ef99e603dff3e53da69e91a733345 --- /dev/null +++ b/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.95 + 100.64.20.95 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717635147 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0bc27400-239f-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03f0743a68a0f3a77f84ce96326f0c9d419c5f30 --- /dev/null +++ b/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.98 + 100.64.28.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709861686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0bc2ea60-dcec-11ee-a882-b9479a05bea4 + + + diff --git a/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21de1a1734ee8562564a1af023695cbb2388e866 --- /dev/null +++ b/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.200 + USER-0015-1333.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0bc45160-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..066ee7f92a302f93043e9605a1cc916a0e0babad --- /dev/null +++ b/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.213 + 100.64.82.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661760200 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..589f687ec9df0e3ca40c84da1494dff54647e0a1 --- /dev/null +++ b/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.214 + 100.64.82.214 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.139 + 100.64.71.139 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.215 + 100.64.82.215 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bc8f360-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bf7b68571498d634547247bbbde4510019bcb76 --- /dev/null +++ b/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,467 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.17 + 100.64.77.17 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.216 + 100.64.82.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.127 + 100.64.72.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.217 + 100.64.82.217 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.170 + 100.64.79.170 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.218 + 100.64.82.218 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.5.111 + 100.64.5.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.219 + 100.64.82.219 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bca7a00-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4b0003580631ba7cdaf13a68a87a0395c476c56 --- /dev/null +++ b/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml @@ -0,0 +1,653 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.251 + 100.64.44.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.44.252 + 100.64.44.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.253 + 100.64.44.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.254 + 100.64.44.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.255 + 100.64.44.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.16 + 100.64.43.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.254 + 100.64.27.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.1 + 100.64.45.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.84 + 100.64.41.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.1 + 100.64.45.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.2 + 100.64.45.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.3 + 100.64.45.3 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.4 + 100.64.45.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + INCIDENT_LINK + 1685562479 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd2c300-ffec-11ed-97eb-05d23f72b81e + + + diff --git a/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbfd09761ede872d7ceaa9397462f95c7ad341c3 --- /dev/null +++ b/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0bd2e2c0-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2154b5c99a7023bea259cdeac6e94831414409c5 --- /dev/null +++ b/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.167 + 100.64.68.167 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.151 + 100.64.11.151 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595523 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd85680-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595523 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd85680-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595523 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd85680-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595523 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bd85680-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2de6bb98a0efa4501cf10c730c48252abf0a7f54 --- /dev/null +++ b/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.59 + 100.64.30.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.188 + 100.64.1.188 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.16.98 + 100.64.16.98 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771215 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bde1dd0-01d2-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd30d445f8376bf4e7434239f803a3a74f8e47c5 --- /dev/null +++ b/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.33 + 100.64.62.33 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.254 + 100.64.62.254 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.176 + 100.64.38.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.175 + 100.64.42.175 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.255 + 100.64.62.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.141 + 100.64.20.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.1 + 100.64.63.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.53 + 100.64.12.53 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048607 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bdefad0-4402-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60560f3db57867eea145dd7c0f26cd2455382d22 --- /dev/null +++ b/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.126 + 100.64.2.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690570841 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0bea20d0-2d79-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec12ad7d1761b279ce926dd103b4ade4eddcd558 --- /dev/null +++ b/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.73 + 100.64.4.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bed96b0-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f4affcf176a917dfc104fefdf64b583a36696c4 --- /dev/null +++ b/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.175 + 100.64.16.175 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689552074 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bede230-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552074 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bede230-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1963242d6bcf46fccb0a9a79eef015b200c769c7 --- /dev/null +++ b/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0bee04e0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7e240141a8f98a3351eee3eeea14a64a46c4e81 --- /dev/null +++ b/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.16 + 100.64.80.16 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675305 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bf72b90-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675305 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bf72b90-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a0e1b809504a7f1a300f5e359f952f0f57919e0 --- /dev/null +++ b/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.239 + 100.64.53.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711570654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0bf7da00-ec77-11ee-a77b-a53bbd4435f6 + + + diff --git a/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..712f829acc5b4373cd8fbd25b0b65665c04df1dc --- /dev/null +++ b/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.245 + 100.64.56.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193708 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0c045980-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3dd8e3ade74db9d166a753ca3fdc19035690a392 --- /dev/null +++ b/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f5fae7f5c5ed555cd7863fb85e65c0a58ad15c1 --- /dev/null +++ b/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.73 + 100.64.4.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c06c400-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a4647313d45276ae25a9e42eda60356c1f8b247 --- /dev/null +++ b/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.239 + 100.64.53.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711570654 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c074350-ec77-11ee-a77b-a53bbd4435f6 + + + diff --git a/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60e8240770c55f4bda536f982d8213a96c054429 --- /dev/null +++ b/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.252 + 100.64.26.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694475396 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c2adb60-50fc-11ee-b46e-fdf8dcf22177 + + + diff --git a/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26b9b0f6063385a97301ed1b362509ec8538e7c1 --- /dev/null +++ b/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.245 + 100.64.56.245 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687193708 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c2b4270-0ec2-11ee-b787-21cb0230290d + + + diff --git a/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dc008c58b0f876bbd88a373e39222c63802f3e5 --- /dev/null +++ b/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.43 + 100.64.13.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521130 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c30acb0-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdd3da1c157e5bf0f154f6e63d383d1d9b30ca88 --- /dev/null +++ b/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.49.18 + 172.16.49.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.0.189 + 100.64.0.189 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698343873 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c3e0170-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c3e0170-742b-11ee-8022-698b2c645bc2 + + + diff --git a/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3bf129db5b690875f84488b61dd2d535730077b --- /dev/null +++ b/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.43 + 100.64.13.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0c476900-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48fc924f74274563b9cadb69b7d5a6b8be699be5 --- /dev/null +++ b/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.186.190 + 172.31.186.190 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.77 + 100.64.87.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.255.161 + 172.29.255.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.29.5.80 + 172.29.5.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.89.225 + 100.64.89.225 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.226 + 100.64.89.226 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.227 + 100.64.89.227 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.228 + 100.64.89.228 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.229 + 100.64.89.229 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.230 + 100.64.89.230 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343873 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c4c8060-742b-11ee-8022-698b2c645bc2 + + + diff --git a/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10ddb25907a9e3cde05b6724d54c8aff9878295c --- /dev/null +++ b/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.78 + 100.64.30.78 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419430 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0c521fb0-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba435de221bd75167e20b6b48768b2d006a82e44 --- /dev/null +++ b/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.3 + 100.64.76.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.220 + 100.64.82.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760201 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfaf59238066082dcbf93c263e0b19b694a208a4 --- /dev/null +++ b/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.169.142.210 + 10.169.142.210 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.80.172 + 100.64.80.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.82.188 + 100.64.82.188 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666301699 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301699 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301699 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301699 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1980ea5582fe4c1688def34004af98830c92b4a --- /dev/null +++ b/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.38 + 100.64.14.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c5c0270-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbe767f0a0024b8694d2bcb4b1e9ad493904e79f --- /dev/null +++ b/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.78 + 100.64.30.78 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419430 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c622540-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a910a13c5c33c70e3e9a1ea8ba28c8db6438c89c --- /dev/null +++ b/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.79 + 100.64.97.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1663020344 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c642fc0-32e7-11ed-92e6-3b94efab0d7b + + + diff --git a/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6cdb9e6749184d432dabfe362932fe158b19b5b --- /dev/null +++ b/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.214 + 100.64.17.214 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690055 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0c698e40-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf7f4a422a2bb3726fe659209123a65a1231c86f --- /dev/null +++ b/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.97.79 + 100.64.97.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663020344 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c6abf70-32e7-11ed-92e6-3b94efab0d7b + + + diff --git a/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2693a9c6a67ae0d6735d1cf02e3cf63f1f91e721 --- /dev/null +++ b/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,251 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.46 + 100.64.11.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.115 + 100.64.59.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + INCIDENT_LINK + 1694549699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c6c2180-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa9c29a71c3fc1f6da48728a14e96b7769caf605 --- /dev/null +++ b/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.85 + 100.64.97.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663020344 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c70b2e0-32e7-11ed-92e6-3b94efab0d7b + + + diff --git a/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f317064e2b7949dbc317e93471eef6eca7beaa9f --- /dev/null +++ b/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.38 + 100.64.14.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0c72e5d0-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aadbe9d89835bdb58ac7859e49ee98079dc50ba5 --- /dev/null +++ b/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.85 + 100.64.97.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663020344 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c78a220-32e7-11ed-92e6-3b94efab0d7b + + + diff --git a/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daa6ad2acd8085a793db8cd23e1817f1902dbd37 --- /dev/null +++ b/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1668885122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c81fd20-683e-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c81fd20-683e-11ed-96b7-d9d8859696d0 + + + diff --git a/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbfeff8bd522be0eae2c42266fee358bf80303ec --- /dev/null +++ b/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.130 + 100.64.68.130 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702791312 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c82f960-9c9e-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702791312 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c82f960-9c9e-11ee-b60c-751684393f5d + + + diff --git a/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f398d531397b97a7f336111853d494fa7290bf2c --- /dev/null +++ b/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.43 + 100.64.11.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690055 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c874f70-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..418346fc07103642e3b2ad8a04c9d89df3c02f53 --- /dev/null +++ b/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.251 + 100.64.14.251 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.207 + 100.64.10.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.140 + 100.64.24.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0c8d4a70-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a8530138986f9887bc4f0945d42aeec340cafe2 --- /dev/null +++ b/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.180 + 100.64.59.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.254 + 100.64.71.254 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.236 + 100.64.82.236 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690510283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c932d20-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c932d20-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c932d20-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0c932d20-2cec-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8babcc9c96ffc097a938783464585921a15f127f --- /dev/null +++ b/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.43 + 100.64.11.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690055 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c975500-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36610133fe3ba438a59df282f3e470fd336443ac --- /dev/null +++ b/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.142 + 100.64.24.142 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.144 + 100.64.20.144 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.143 + 100.64.24.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583706 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0c9ba250-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d528add3deb0e841a3c8209a646856f3e7c86d31 --- /dev/null +++ b/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.216 + 100.64.17.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690055 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ca585d0-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a528d5602def1350cc5b50d1a3e7a48391babc32 --- /dev/null +++ b/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0ca6c920-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad3fdb1f88f2db7ec455149b03a640f21186da56 --- /dev/null +++ b/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.248 + 100.64.10.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.249 + 100.64.10.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.202 + 100.64.8.202 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.250 + 100.64.10.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.251 + 100.64.10.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.252 + 100.64.10.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.255 + 100.64.10.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.1 + 100.64.11.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.180 + 100.64.5.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.1 + 100.64.11.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001205 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb0dc20-a79f-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..882303419ed7436a3907aeaa60167713c7e59cdb --- /dev/null +++ b/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.216 + 100.64.17.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711690055 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cb64eb0-ed8d-11ee-a847-a3414fa40fa2 + + + diff --git a/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3777e77de3970a27a6ea8442930b68473bb0b5f0 --- /dev/null +++ b/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.191 + 100.64.12.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129125 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0cb65df0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1ba3dae87c9b0c883d9e1f21d7ac624b8cf87de --- /dev/null +++ b/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.96 + 100.64.21.96 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8030eb4451bfb795e1e985ffd3996cf945f45226 --- /dev/null +++ b/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.147.128 + 172.26.147.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.14 + 100.64.87.14 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698343874 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cbd4390-742b-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343874 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cbd4390-742b-11ee-8022-698b2c645bc2 + + + diff --git a/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3fad3553e073e24d62d49754a2c6f17ceecbf23 --- /dev/null +++ b/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.191 + 100.64.12.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698129125 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cc9bee0-7237-11ee-b711-0bbf36a3b18a + + + diff --git a/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72063fa50df5d7b709657c7300be038ea036dc14 --- /dev/null +++ b/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.96 + 100.64.21.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712521131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cd50300-f51c-11ee-a3ea-3503a39e6b10 + + + diff --git a/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb198d31d2ba6186bf345a6fa65fc7b175760106 --- /dev/null +++ b/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.206 + 100.64.46.206 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690570842 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cd9ff10-2d79-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efc60d038a17908bf7753e33b06ca2d1ee764197 --- /dev/null +++ b/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ce97770-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab68aca6a5caa1218510397d4193e2f48a341a97 --- /dev/null +++ b/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.180 + 100.64.95.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.95.181 + 100.64.95.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.182 + 100.64.95.182 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.5.103 + 100.64.5.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0cf01f10-3fad-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..991786e90e446e1273dd7213536eaade636928ce --- /dev/null +++ b/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.144 + USER-0015-1259.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.49 + 100.64.53.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.154 + 100.64.19.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.29 + 100.64.47.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098015 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cf526f0-30ed-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eda66f833d6e20c88d6fd7bbb02e2ffd0204d08a --- /dev/null +++ b/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.172 + 100.64.35.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121229 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0cfab540-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad08a428f407c2afa21fb2d673b0af7568fc24ed --- /dev/null +++ b/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.206 + 100.64.46.206 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690570843 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d0331f0-2d79-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2723b720de81e88549d04d6befb4e61647d9640e --- /dev/null +++ b/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.97 + 100.64.20.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717635149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d0af990-239f-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f79f9bec9bd4a8409008f936290a1ebe5ca5731d --- /dev/null +++ b/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0b2fe1dd3ab1a6c854b02872bed331b0c1dccc7 --- /dev/null +++ b/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.97 + 100.64.20.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1717635149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d1c85c0-239f-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbbc76f2818c069d6d3ff60d4f68bd23c5163fc2 --- /dev/null +++ b/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.36.85 + 100.64.36.85 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686614748 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d24f840-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614748 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d24f840-097e-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2ed4981c4dfb01c2d29bcd937a4abe22b7799ad --- /dev/null +++ b/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.9.67 + USER-0015-2057.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.91.35 + USER-0015-2058.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720448783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0d2c7380-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0d2c7380-3d36-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce2e23ec910996e9b833efcd92bb6f4973abc2cc --- /dev/null +++ b/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0d389880-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..538029c54748b4792a2281d9b0971ad0de54dfc5 --- /dev/null +++ b/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d476590-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62c1499c5144828803d64c0993fd052482e28a5c --- /dev/null +++ b/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.117 + 100.64.47.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684997693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0d483580-fac9-11ed-ace2-756da26201e9 + + + diff --git a/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5a21bb5f077b79c0ecb5dfb3e014d0ba180905e --- /dev/null +++ b/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.164 + 100.64.47.164 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d52c090-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e365f9b09e6181ee65aff530bff268b15c9141f4 --- /dev/null +++ b/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d582e70-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ec8ac05726255116ffb7a93d03c10c3ebbaaeff --- /dev/null +++ b/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.47.117 + 100.64.47.117 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684997693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d624d30-fac9-11ed-ace2-756da26201e9 + + + diff --git a/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aad914c8edd318d3165d35654d6a3b9d755769b2 --- /dev/null +++ b/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0d66d470-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e097260f0bfebb62cd185d7350b58766cc18f0d --- /dev/null +++ b/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.32 + 100.64.75.32 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.27 + 100.64.21.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.79 + 100.64.71.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.221 + 100.64.82.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.222 + 100.64.82.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.223 + 100.64.82.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.224 + 100.64.82.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760202 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d74cea0-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c3162c08377d488002598013fbd15ce9e25cd45 --- /dev/null +++ b/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.132.243 + 172.21.132.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.71 + USER-0015-2041.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719583777 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d776f60-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583777 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0d776f60-3558-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b9659f578403148b1b54d77271037740ec0e32a --- /dev/null +++ b/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97e9df4c373818af300ac4ca595cb20303fe39d0 --- /dev/null +++ b/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94bdc30b7c622d5c8c6c4b9419b19a4e5b74dae5 --- /dev/null +++ b/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.226 + 100.64.14.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.156 + 100.64.60.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.89 + 100.64.12.89 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.1 + USER-0015-1253.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.241 + 100.64.17.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494359 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dc882a0-117e-11ee-b107-2764325d5a51 + + + diff --git a/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd143fac4d0d21e48016406c7687da05285e36c2 --- /dev/null +++ b/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.166 + USER-0015-1366.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720111629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0dce7590-3a25-11ef-898a-03f77eec545d + + + diff --git a/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e534921255bcedf69d9a822c0566dcd3ec48040 --- /dev/null +++ b/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.235.253 + 172.23.235.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.93.216 + 100.64.93.216 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620485 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dd778e0-2f44-11ed-acc5-dbb3944f5f62 + + + INCIDENT_LINK + 1662620485 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0dd778e0-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml b/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3d551ab8cd4da053c6fe99dc4b20abce224775e --- /dev/null +++ b/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711209450 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0ddc4190-e92e-11ee-94d2-69297fe1125f + + + diff --git a/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e0a4809e6d58c57f885cb603f3437b4722fa36e --- /dev/null +++ b/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.96 + 100.64.55.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718871672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0de39210-2ede-11ef-bd60-9f7fcaee2ef2 + + + diff --git a/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ef6aca8d01a3ce6c2b979f7f1de234292a94fbb --- /dev/null +++ b/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.166 + USER-0015-1366.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720111629 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0de531e0-3a25-11ef-898a-03f77eec545d + + + diff --git a/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..649a65318a1acd7554831066f8d70928f6398233 --- /dev/null +++ b/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0df87670-1617-11ee-a56a-d1ac4d0caa4c + + + INCIDENT_LINK + 1687999877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0df87670-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20e928f521617483c926a1afd868fcab6be9ee4b --- /dev/null +++ b/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.85 + 100.64.69.85 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744991 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e026650-5c88-11ee-8e0e-93298c809ccb + + + diff --git a/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..559d77ab616b422838ab7568f4c4ea802b76185a --- /dev/null +++ b/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.230 + 100.64.68.230 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.231 + 100.64.68.231 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490043 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e03f0f0-e2a3-11ee-8bca-5190faa7db82 + + + diff --git a/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml b/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f30b73b16f7e25c24a5eb7e09b2703a78723c413 --- /dev/null +++ b/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1689619938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e241850-24d3-11ee-8319-ef84a69e2089 + + + diff --git a/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c962d0f9d88b1f16788b606432d143e794ed6f47 --- /dev/null +++ b/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999877 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e2b9460-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml b/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml new file mode 100644 index 0000000000000000000000000000000000000000..010c8daf2a74f052cde1c6353fe1b0e53eaccb77 --- /dev/null +++ b/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689619938 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e2e0360-24d3-11ee-8319-ef84a69e2089 + + + diff --git a/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a8fca1b0d35aecccdb6274fb730f7eb13639c99 --- /dev/null +++ b/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.234 + 100.64.9.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698486899 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e3195c0-7578-11ee-8cab-f39a0af54aaa + + + diff --git a/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5189d346f481d0e91c4016242e7925a08e4ac7a3 --- /dev/null +++ b/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.222 + 100.64.59.222 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781104 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e59e700-7825-11ee-8281-459da66dfacb + + + INCIDENT_LINK + 1698781104 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e59e700-7825-11ee-8281-459da66dfacb + + + INCIDENT_LINK + 1698781104 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e59e700-7825-11ee-8281-459da66dfacb + + + INCIDENT_LINK + 1698781104 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e59e700-7825-11ee-8281-459da66dfacb + + + INCIDENT_LINK + 1698781104 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e59e700-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5404f1f3e3d1d3d0bdb496eaf5ee6be205f67367 --- /dev/null +++ b/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e633640-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e29c35b81839692e233bc9974f74427cd67fd04e --- /dev/null +++ b/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.102 + 100.64.15.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.192 + 100.64.25.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.124 + 100.64.13.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.193 + 100.64.25.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.194 + 100.64.25.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.9 + 100.64.3.9 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203660 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e6596a0-456b-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06eed4e313b3cb4e088c7959186eb5d8491e367d --- /dev/null +++ b/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.232 + 100.64.68.232 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.233 + 100.64.68.233 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710490044 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e68f450-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490044 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e68f450-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490044 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e68f450-e2a3-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490044 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e68f450-e2a3-11ee-8bca-5190faa7db82 + + + diff --git a/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b8ceecc219159b0a1ca9cb306abc3590ed27a59 --- /dev/null +++ b/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.222 + 100.64.59.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e6aafe0-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f97aa005c46ecd64178115ecee036434fe8434a --- /dev/null +++ b/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.248 + 100.64.61.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e740f10-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7adaf87d255b0b1b2a77497f68aef54b22086940 --- /dev/null +++ b/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678310002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e7904d0-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4645d89b00f6896ff98393595718c7c4c02dee8 --- /dev/null +++ b/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.222 + 100.64.59.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0e7a8e60-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64f18c558ff788f81846ae8d98957165a7f052b2 --- /dev/null +++ b/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678310002 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e7cfc70-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..372fc0205ea94b050050721d11e9c3e61cde9c3f --- /dev/null +++ b/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.223 + 100.64.59.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e87adc0-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ec52b460a24e98f5a481d5be1796c5aaab6d91a --- /dev/null +++ b/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504605 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0e881460-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29731d4d2e44cbf0627a73d20e3fed4b462ababd --- /dev/null +++ b/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684997695 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0e9500d0-fac9-11ed-ace2-756da26201e9 + + + diff --git a/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6e8c4d5657c9d52852045ecc07046666a75dcd0 --- /dev/null +++ b/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.223 + 100.64.59.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781104 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e954250-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5c32b9ef51e9e43b14146edefa80d103541ee0c --- /dev/null +++ b/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.248 + 100.64.61.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687999878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c + + + diff --git a/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fde6373994f3b551a54afe57b81369940249350 --- /dev/null +++ b/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694504606 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0e97f2e0-5140-11ee-8c6c-911c18a26b28 + + + diff --git a/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9aa4417ce77cb8bac0edd2750375a04595702a2f --- /dev/null +++ b/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.212 + 100.64.4.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688982137 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0e9e1510-1f06-11ee-984e-6dd184c65476 + + + diff --git a/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdd4af24bfd7bfbeba135c679149a1a34935c3f6 --- /dev/null +++ b/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.226 + 100.64.59.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698781105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0ea34c10-7825-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d43efc18b70d1ff93d65cd1b38c994295dd59aa3 --- /dev/null +++ b/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.151 + 100.64.8.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ea79240-de35-11ee-affe-870d7afbe1b0 + + + INCIDENT_LINK + 1710002995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ea79240-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d76bcee601d5d21b3c6e4527927941936d537345 --- /dev/null +++ b/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.86.20 + 100.64.86.20 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688165664 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0eaabe10-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b29802b8f75b79964f732362aa555d646397aef --- /dev/null +++ b/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.199.70 + USER-0015-1926.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"] + + + HOST + 192.168.45.70 + 192.168.45.70 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Windows Active Directory","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666301703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0eab33f0-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0eab33f0-50bf-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3eed5897d6a671fc2c29e8ce26cf28826767edfe --- /dev/null +++ b/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.189 + 100.64.82.189 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666301703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0eb10050-50bf-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666301703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0eb10050-50bf-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7df9904223c417edf2cf2b9ffdc7d0c038f10eaf --- /dev/null +++ b/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.175 + 100.64.62.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696858248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0eb44c60-66a8-11ee-8819-db4d49a98ea0 + + + diff --git a/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05ced1949796abaac4890bf40df724be42f54360 --- /dev/null +++ b/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.86 + 100.64.16.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ec5c8a0-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bf035cb66f39cb7941f45707990996c61e23f63 --- /dev/null +++ b/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.86 + 100.64.16.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0ed754d0-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dd49230d968ead814f0dd860431f93512d1be2a --- /dev/null +++ b/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,381 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.208 + 100.64.46.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.236 + 100.64.19.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.209 + 100.64.46.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.184 + USER-0015-1360.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.210 + 100.64.46.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.248 + 100.64.31.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.61 + 100.64.28.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.211 + 100.64.46.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.146 + 100.64.8.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ef6c490-2d79-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4efe63345408eb186ae97135e9be11d9f8a424d --- /dev/null +++ b/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.135 + 100.64.32.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f1b9770-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bb8c59e786ded5954691e62c8941b374afc607c --- /dev/null +++ b/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.203 + 100.64.24.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f1d79e0-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..214106fa308fde18248a3fd1b2a952dc9d8ed387 --- /dev/null +++ b/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f297a20-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9c2852a333c9a31b7f9b5d5764948e6fd82668e --- /dev/null +++ b/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.219 + 100.64.37.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.220 + 100.64.37.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.221 + 100.64.37.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.222 + 100.64.37.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f298570-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1993355a4927bccfd67897b77bcbb86949729cc7 --- /dev/null +++ b/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.225 + 100.64.82.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.39 + 100.64.1.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.84 + 100.64.82.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661760205 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f29aa90-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760205 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f29aa90-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760205 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f29aa90-2771-11ed-9f61-91ab69ba9b3b + + + INCIDENT_LINK + 1661760205 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f29aa90-2771-11ed-9f61-91ab69ba9b3b + + + diff --git a/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b6a1b4de46019f9714c3d4f2b07a9de50c53f20 --- /dev/null +++ b/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.24 + 100.64.86.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688165664 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f2b86d0-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89a9f3ef1b5e0c0b7e857625c496ecbfff7622cf --- /dev/null +++ b/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.249 + 100.64.2.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717918191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f2b9730-2632-11ef-bbd8-ff4fc7f3a856 + + + diff --git a/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f5a77027d87863c6257a65f27cdd30f551c5947 --- /dev/null +++ b/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.88 + 100.64.16.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f2bb660-de35-11ee-affe-870d7afbe1b0 + + + INCIDENT_LINK + 1710002996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f2bb660-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25dca54d1b3f7ef58ba83d7603478b9edeb5ff8a --- /dev/null +++ b/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f384730-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23aba11e8897f947f9b4ed2d86a64dcf15c49af4 --- /dev/null +++ b/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.88 + 100.64.16.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0f3e5400-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbba883cdb8dfb3588606ade2d0f4f0e82b4b3fe --- /dev/null +++ b/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.203 + 100.64.24.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090205 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f3f0ba0-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..763cf3d3e33567d7645fcf9705206d92af87df81 --- /dev/null +++ b/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.216 + USER-0015-1361.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690570846 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f43ac10-2d79-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20d1fcb142e6f01e487da72ce0569efe677169c8 --- /dev/null +++ b/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f4c1d50-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..064c6cfef428a9712a8b3e4e7724ab558e0f8dc8 --- /dev/null +++ b/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.221 + 100.64.74.221 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.1 + 100.64.74.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.27 + 100.64.8.27 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.247 + USER-0015-1745.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.67.234 + 100.64.67.234 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.82 + 100.64.18.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.248 + 100.64.76.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.249 + 100.64.76.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.250 + 100.64.76.250 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.251 + 100.64.76.251 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.252 + 100.64.76.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.65.56 + 100.64.65.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f54de90-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd7efb1dedc7717a0ad828275d30101decf2095d --- /dev/null +++ b/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688306540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f585720-18e1-11ee-9b6c-2d03eea98951 + + + INCIDENT_LINK + 1688306540 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f585720-18e1-11ee-9b6c-2d03eea98951 + + + diff --git a/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af803d5ebde230b170e053591023519c09d2deeb --- /dev/null +++ b/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.96 + 100.64.73.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668885127 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f5a7180-683e-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885127 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f5a7180-683e-11ed-96b7-d9d8859696d0 + + + diff --git a/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea1d6bd1e3d874f315ca44473ed2008c612b65e5 --- /dev/null +++ b/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.24 + 100.64.86.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688165665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f5b2250-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f439bfadd798b9d72942d16921de16b4be358618 --- /dev/null +++ b/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1693247470 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f5eb350-45d1-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9ad73bcb1cdce05726a376dbaec35f9af47e051 --- /dev/null +++ b/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.117 + 100.64.47.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.93 + 100.64.62.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.94 + 100.64.62.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.12 + 100.64.36.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.76 + 100.64.29.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.37 + 100.64.30.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114000 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f6d5eb0-9675-11ee-ab9f-854a086fd880 + + + diff --git a/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..070d6b1a3f5262b0e99dcb5c0c0b2bab4ba10fba --- /dev/null +++ b/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090205 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f6f4360-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56d1038cb9615c3ee0024572d6c9ddfdb0391384 --- /dev/null +++ b/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.139 + 100.64.32.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f721be0-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2e04ba14f8b3209a708a63b07f22ff8d93b010a --- /dev/null +++ b/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.139 + 100.64.32.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f8073c0-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14aca70e475a024a80a5432134cac48093a9f3e6 --- /dev/null +++ b/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.209 + 100.64.70.209 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1694390790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f8175f0-5037-11ee-a37e-a35a02afc742 + + + diff --git a/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77a3029d528256cd2ac16be476cb17cd79b48392 --- /dev/null +++ b/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml @@ -0,0 +1,773 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.238 + 100.64.36.238 + ["Exploiting Host"] + 0.8576171875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.66 + 100.64.68.66 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.67 + 100.64.68.67 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.84 + 100.64.12.84 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.68 + 100.64.68.68 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.64.42 + 100.64.64.42 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.69 + 100.64.68.69 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + INCIDENT_LINK + 1695542271 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 0f820ff0-5ab0-11ee-892e-3b87e68adb1a + + + diff --git a/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml b/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ab227d1ce19ffe74ad34a2ab48185cb6d1bb1a1 --- /dev/null +++ b/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.141 + 100.64.10.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692595924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f83bfd0-3fe4-11ee-9108-95499536c7df + + + diff --git a/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc7a2c4a128d0043bf1d88ca10ba608f395cb189 --- /dev/null +++ b/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.209 + 100.64.70.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694390790 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f84f860-5037-11ee-a37e-a35a02afc742 + + + diff --git a/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c35908f7079a23619d31bd61a87a4590b4ea2e96 --- /dev/null +++ b/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.5 + 100.64.81.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695870407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f892bb0-5dac-11ee-852f-d98ba2bc54fb + + + diff --git a/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..026e81d7f785d3b406d8478b2d5f82c02db13755 --- /dev/null +++ b/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.145 + 100.64.49.145 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614039 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ce7866be5767951194888cdd15ffcd7c842b2a1 --- /dev/null +++ b/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090205 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0f936d30-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b8f3012322a9e99149ce172581cb9b36adbed95 --- /dev/null +++ b/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.81.5 + 100.64.81.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695870407 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0f95fcf0-5dac-11ee-852f-d98ba2bc54fb + + + diff --git a/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77e22562ca014698de8e8d1ede5b091a249a80ef --- /dev/null +++ b/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.36 + 100.64.1.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686675311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f990a70-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0f990a70-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0979c51102d6e99afe800b3617aff649183233db --- /dev/null +++ b/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.90 + 100.64.16.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002997 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fa1a9b0-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8959c3b26ee221c53cb869dacbf7f8df5533bad --- /dev/null +++ b/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.31 + 100.64.73.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670143123 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0fa44bd0-73af-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..018c9462347e61c31d6bd31ddddb792314c25b55 --- /dev/null +++ b/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.217 + 100.64.93.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662620488 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fa66c80-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b67d27cf2d42a57f0e192f8a54883e2dfab76843 --- /dev/null +++ b/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.31 + 100.64.73.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.32 + 100.64.73.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670143123 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0faab470-73af-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cef2addccf6c55089171a26035b7e2693175178 --- /dev/null +++ b/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.217 + 100.64.93.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662620488 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0fad9870-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d0a09f7112745f14d1281c97d8dfa1906106c59 --- /dev/null +++ b/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.117 + 100.64.92.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678001195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0faf2a90-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0204ba1077cd741ecabcb35ccad4ecb2ec2654cf --- /dev/null +++ b/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.237 + 100.64.82.237 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.53.225 + 100.64.53.225 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0faf6140-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0faf6140-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0faf6140-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0faf6140-2cec-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..736a68a766eaeef18c2dae3610b1b720d081128d --- /dev/null +++ b/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.221 + 100.64.93.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662620488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fb20540-2f44-11ed-acc5-dbb3944f5f62 + + + diff --git a/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7373038fa7aab7a2c4e715e40c1236e07b2595cb --- /dev/null +++ b/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.117 + 100.64.92.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678001195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fb34940-bb27-11ed-b3d4-01a3306b45e6 + + + diff --git a/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac77c539c8c71ebc3edb580e18030a8e8bf7a92a --- /dev/null +++ b/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.141 + 100.64.32.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fb47c10-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml b/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57d3b419d5cc8adedf3947d4bea003fb403f243b --- /dev/null +++ b/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.169 + USER-0015-1299.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694274827 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fb88b30-4f29-11ee-8f95-3f205431a8e8 + + + diff --git a/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..861fe9bc2a576864361b77587eb1f48608a12bab --- /dev/null +++ b/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.90 + 100.64.16.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002997 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0fb88d10-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccc0920b74c351a80a564b3260ba34dccfc625ce --- /dev/null +++ b/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090206 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0fba7d30-0dd1-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32ba3b7ac122c9884123c3d793fdcc313693435d --- /dev/null +++ b/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.11 + 100.64.11.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.12 + 100.64.11.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.14 + 100.64.11.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.15 + 100.64.11.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.16 + 100.64.11.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.17 + 100.64.11.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.18 + 100.64.11.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fbbab20-a79f-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40881816a485ee9b832e21e88d51b250b68af7d5 --- /dev/null +++ b/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.141 + 100.64.32.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0fc210a0-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c443affea3bd1c85c0ab58aa6cd9440996f273ce --- /dev/null +++ b/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.238 + 100.64.82.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0fc448d0-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0fc448d0-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0fc448d0-2cec-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690510288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 0fc448d0-2cec-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4955661e34865091533c36123733c375e7dbb618 --- /dev/null +++ b/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.65 + 100.64.20.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.66 + 100.64.20.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.67 + 100.64.20.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.68 + 100.64.20.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.69 + 100.64.20.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.71 + 100.64.20.71 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.72 + 100.64.20.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.73 + 100.64.20.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.74 + 100.64.20.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.75 + 100.64.20.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.76 + 100.64.20.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.77 + 100.64.20.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231247 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fd974b0-214a-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml new file mode 100644 index 0000000000000000000000000000000000000000..193cb741ebcce32c8ef65c00725a2f4e34c27d86 --- /dev/null +++ b/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.219 + 100.64.37.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.186 + 100.64.42.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720465108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fde30c0-3d5c-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fde30c0-3d5c-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fde30c0-3d5c-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465108 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 0fde30c0-3d5c-11ef-86a6-4db713805853 + + + diff --git a/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..532d87f1c193a3e28e15752a846ad49c7d5470df --- /dev/null +++ b/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.125 + 100.64.47.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419436 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0fdfda50-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a81091f23b40b1541b69d9959094bd5bf70a460 --- /dev/null +++ b/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.125 + 100.64.47.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419436 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 0fef91c0-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92965636fc1b37fc1172ca666279bc7dcc914033 --- /dev/null +++ b/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.143 + 100.64.32.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + INCIDENT_LINK + 1700694085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 0ffd44e0-898b-11ee-a5cb-3993aaffe494 + + + diff --git a/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13669a1cbd4a2b7e762fbad7031e74af2904ec55 --- /dev/null +++ b/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.30 + 100.64.62.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688041112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10044a60-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10044a60-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc95dd612f0089e1d3a9f0e40e1401a3447e044a --- /dev/null +++ b/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.110 + 100.64.42.110 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698486902 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1036b490-7578-11ee-8cab-f39a0af54aaa + + + diff --git a/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4126fddefebdbb7f66eb981f0588ae1ce6c11ea6 --- /dev/null +++ b/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.174 + 100.64.35.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696121234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1041f100-5ff4-11ee-a4ff-1bc46b312733 + + + diff --git a/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0102626780e11d1a990dfdc95817d7ad9475b5ed --- /dev/null +++ b/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.110 + 100.64.42.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698486902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1046ba20-7578-11ee-8cab-f39a0af54aaa + + + diff --git a/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..151b25d62140e2ac7e711d0a4962d47339a12c93 --- /dev/null +++ b/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.55 + USER-0015-1516.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.178 + 100.64.69.178 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614324 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1046ee30-097d-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82a7cf65fad11645459f1418984d6844f63603f7 --- /dev/null +++ b/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.170 + 100.64.14.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694797096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10470800-53e9-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9766a6b05b8efabb6d0cde33269eadf6722e6c2a --- /dev/null +++ b/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.233 + 100.64.28.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.73 + USER-0015-1746.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.100 + 100.64.21.100 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.253 + 100.64.76.253 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.254 + 100.64.76.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.56.245 + 100.64.56.245 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.255 + 100.64.76.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.101 + 100.64.71.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.226 + 100.64.12.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.86 + 100.64.76.86 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.39 + 100.64.73.39 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.193 + 100.64.72.193 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.1 + 100.64.77.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.26.223 + 100.64.26.223 + ["Exploiting Target","Exploiting Host"] + 0.9746875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085482 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 105e1130-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1263cb646189ee47e40205fc56fec84a5c53963 --- /dev/null +++ b/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.94 + 100.64.13.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072666 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1064af90-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e21d4717b56852ef2fbbf61add91d9111c61f20e --- /dev/null +++ b/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.92 + 100.64.16.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710002998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 106f8100-de35-11ee-affe-870d7afbe1b0 + + + diff --git a/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d161ae4f5daf2b60a9aa82e388c9e7c2427f9d1b --- /dev/null +++ b/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.94 + 100.64.13.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072667 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 10755160-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed1d48d59d675971496d77783f2fc8bc97b081ad --- /dev/null +++ b/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.8 + 100.64.46.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614040 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10761b40-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52abc1f85d22c1c4a857c22cee592be2d30dd022 --- /dev/null +++ b/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.229 + 100.64.35.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581156 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10836b20-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba4849ca681ca7ca6d956eaf386a8aecb9b06ed1 --- /dev/null +++ b/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.242 + 100.64.11.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10836d00-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac9b44af1f0ad06f81c7b4a93acabef591a7b0ff --- /dev/null +++ b/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.94 + 100.64.13.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072667 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10861a40-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b01d712710d9a8d23e5964245a1b464a5bb7ed6 --- /dev/null +++ b/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.26.252 + 100.64.26.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656670671 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 108bc940-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670671 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 108bc940-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670671 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 108bc940-f927-11ec-8816-1bf0e44958da + + + INCIDENT_LINK + 1656670671 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 108bc940-f927-11ec-8816-1bf0e44958da + + + diff --git a/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b565de20b0605d6cdf0f9cc858cb3282689fa84c --- /dev/null +++ b/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.94 + 100.64.13.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072667 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10961fd0-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c1a9168ae2203efe99f63fbade4bf77a928aabb --- /dev/null +++ b/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.242 + 100.64.11.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061569 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10971c10-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38307497cec8e0a40e2c7c4eda7189f306ac0623 --- /dev/null +++ b/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.229 + 100.64.35.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581156 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 109a9ca0-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c7ef131595b818938c4c3748029cb0a3f9e7af2 --- /dev/null +++ b/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.158.15 + 192.168.158.15 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.26 + USER-0015-1975.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688165667 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10a359c0-1799-11ee-9bb9-61e0b388f5c0 + + + INCIDENT_LINK + 1688165667 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10a359c0-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b45a1136ba879cb4be8afa9a70fa9864804968c1 --- /dev/null +++ b/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.10 + 100.64.66.10 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1693247472 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10b51b90-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247472 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10b51b90-45d1-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml b/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebd329658f7c484ffc8c613a7c1b14898ca6905b --- /dev/null +++ b/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.252 + 100.64.70.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.254 + 100.64.70.254 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + INCIDENT_LINK + 1659420310 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10cf65e0-1229-11ed-9c54-d9154f941ac4 + + + diff --git a/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7462062774db4cb14d2b5adad2ab57bac0a86adf --- /dev/null +++ b/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.146 + 100.64.12.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10d38eb0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7f5a6c1b25b93b61d0b3f8cf5d00292d2d78e60 --- /dev/null +++ b/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072667 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10d3c510-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e48df7bbafca385edd3ccf61b9b49395b612fb2 --- /dev/null +++ b/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.145 + 100.64.96.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.146 + 100.64.96.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.68.115 + 100.64.68.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.147 + 100.64.96.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.235 + 100.64.95.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.148 + 100.64.96.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.149 + 100.64.96.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.150 + 100.64.96.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.151 + 100.64.96.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.152 + 100.64.96.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.153 + 100.64.96.153 + ["Exploiting Host"] + 0.8734375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.154 + 100.64.96.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.73.223 + 100.64.73.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.13 + 100.64.2.13 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.12.89 + 100.64.12.89 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.96.155 + 100.64.96.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558940 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10d6a840-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef1c6d9ac1164de42c1c40f7755c8f243c330ca6 --- /dev/null +++ b/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061570 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10d7f5a0-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3127b1757a282290c4029d7df1c992459a003d8 --- /dev/null +++ b/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.49 + 100.64.62.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.163 + 100.64.22.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.180 + 100.64.38.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.156 + 100.64.51.156 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.66 + 100.64.40.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.97 + 100.64.62.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.110 + 100.64.35.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.98 + 100.64.62.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.112 + 100.64.33.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702114003 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e04fa0-9675-11ee-ab9f-854a086fd880 + + + diff --git a/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml b/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5919b2005936daee779f9c498b948dfda015ed3 --- /dev/null +++ b/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719589366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e42190-3565-11ef-8ae0-3793ba04d7d6 + + + diff --git a/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..810421871d815816813a5998cdb40a5eb3e2b98e --- /dev/null +++ b/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072667 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10e466e0-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1f156d30a3d237f178a17cad2f087b943a46392 --- /dev/null +++ b/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061570 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 10e87060-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9ecd9a5c9b94c269033bd85f2a66b9e928a46df --- /dev/null +++ b/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.149 + 100.64.21.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.227 + 100.64.37.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.229 + 100.64.37.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10e984f0-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a94b737772a08a7464ff4fa003973b79950f79b4 --- /dev/null +++ b/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.78 + 100.64.59.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767032 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 10ea0190-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae2c1ebad43fec75364f6fa6f29a12d45020ca0e --- /dev/null +++ b/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.125 + 100.64.6.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.36 + 100.64.27.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.37 + 100.64.27.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.38 + 100.64.27.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.39 + 100.64.27.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.40 + 100.64.27.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.41 + 100.64.27.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.42 + 100.64.27.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.43 + 100.64.27.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + INCIDENT_LINK + 1717516185 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10ed67c0-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml b/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aec48c199e90e3fa9be00837099dded1a3a5b229 --- /dev/null +++ b/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719589366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 10f67110-3565-11ef-8ae0-3793ba04d7d6 + + + diff --git a/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84754c91653549409c7a7282b305f2cd030cea17 --- /dev/null +++ b/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.24 + 100.64.18.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.233 + 100.64.37.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10ffa500-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10ffa500-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10ffa500-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 10ffa500-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da19f66584e50484f781f863031391a2a9140f4d --- /dev/null +++ b/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.78 + 100.64.59.78 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767032 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11032ee0-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbbd2cf1c4f4269b40d7b6d5e5d915ad0b9892a5 --- /dev/null +++ b/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.40.208 + 100.64.40.208 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688165667 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11041760-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c88aa0bd8ae56833929ac2528f75d10b2ad5795a --- /dev/null +++ b/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.172 + 100.64.96.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.4.55 + 100.64.4.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.173 + 100.64.96.173 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.174 + 100.64.96.174 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.175 + 100.64.96.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.11.207 + 100.64.11.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.176 + 100.64.96.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.73.223 + 100.64.73.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.153 + 100.64.96.153 + ["Exploiting Host"] + 0.83125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.177 + 100.64.96.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.5 + 100.64.15.5 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.178 + 100.64.96.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.179 + 100.64.96.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.180 + 100.64.96.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.181 + 100.64.96.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.182 + 100.64.96.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.183 + 100.64.96.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.52.35 + 100.64.52.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.6.125 + 100.64.6.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.184 + 100.64.96.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 110d2190-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e34e39863ca2a4ca01cf39070335ca73f739313 --- /dev/null +++ b/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.7 + 100.64.22.7 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419438 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11115570-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5241e7f883cb636fc84f547ae5d985aa60573b4 --- /dev/null +++ b/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.161 + 100.64.33.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061570 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11123f80-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..886d750a83f169cb3d089d4f7d8aa62c0e8f6d5c --- /dev/null +++ b/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.191 + 100.64.91.191 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 111b76a0-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62ffd932ce21d71345a13b20801401be841541e0 --- /dev/null +++ b/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581157 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 111cc4f0-2d91-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690581157 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 111cc4f0-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ef550ec2ff380925c38e8ce5e24d42d22db6b7e --- /dev/null +++ b/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.79 + 100.64.59.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767032 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 111cf870-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6205519912264ab731e256d1fcc1872fe73d46e6 --- /dev/null +++ b/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.170 + 100.64.46.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 111ed7d0-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..991a2b2699fb32fa83c737f8c1260e24e55a8fd0 --- /dev/null +++ b/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.191 + 100.64.91.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1127d2b0-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdf5c4c0437fdbd912dc394d9f8d03ae9ba7b917 --- /dev/null +++ b/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.163 + 100.64.33.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061570 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1129bf20-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e41761f978439a0b51d5cbc8d69551c78241c254 --- /dev/null +++ b/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.172 + 100.64.46.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 112c9370-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a563a6f5b31ba4042cff6a39a953e82a079f397d --- /dev/null +++ b/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.79 + 100.64.59.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767032 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 112d2510-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f9d537d78f991db4952b55ffbd8d3dabe692712 --- /dev/null +++ b/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.107 + USER-0015-1474.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728787 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 112e8980-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..651b76796221ec18e762beccccc9adea4dbd4503 --- /dev/null +++ b/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.200 + 100.64.89.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678310006 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11300e80-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a1c905e1b9f71877d59a71afb2ee783e7ec778e --- /dev/null +++ b/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.197 + 100.64.91.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11331d50-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ffe5b79a852635a19d39c551ec17adb96aadec1 --- /dev/null +++ b/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.200 + 100.64.89.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678310006 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 113a6ec0-bdf6-11ed-931f-716b6cf5eba2 + + + diff --git a/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c8244620971d3f2b9f55d545d984db78891da90 --- /dev/null +++ b/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.163 + 100.64.33.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061570 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 113ad620-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d61d8776aab0c72b81166669536489d943857b4f --- /dev/null +++ b/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.172 + 100.64.46.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 113b6080-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6637d72098de58aabb627bdaa7b0c43f636cb5ff --- /dev/null +++ b/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.197 + 100.64.91.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1140d8f0-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b006e33981a380507905614579c0311ffc1a01d1 --- /dev/null +++ b/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.148 + 100.64.12.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269475 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 1143b5a0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fdb843ea88de8b01b417c152a1202c1213ca99a --- /dev/null +++ b/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.23 + 100.64.54.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 114503d0-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml new file mode 100644 index 0000000000000000000000000000000000000000..752d6e140c7ee5e088c36fa1c65f62040ff95663 --- /dev/null +++ b/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717918195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 114639d0-2632-11ef-bbd8-ff4fc7f3a856 + + + diff --git a/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55012f5ef792220de5a68b270d293ab946440d3c --- /dev/null +++ b/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.192 + 100.64.91.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11465730-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d7e69ed5895f8c1be7dbf69e62fee4e9078460f --- /dev/null +++ b/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 114de710-2d91-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690581158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 114de710-2d91-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690581158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 114de710-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26cdf7bb1fd4b2469ed414dcc8c65bed3ba13c46 --- /dev/null +++ b/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.192 + 100.64.91.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660367780 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11501b30-1ac7-11ed-9242-7df62b3bf04c + + + diff --git a/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af48c45cb95807e55d3eca5cbea68e79ad2706f4 --- /dev/null +++ b/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.59.190 + 172.21.59.190 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.96.199 + 100.64.96.199 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.14 + 100.64.87.14 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.200 + 100.64.96.200 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558941 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11504510-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml new file mode 100644 index 0000000000000000000000000000000000000000..608a9628155d9e9b36aa0a37d7c61bfabcdd02c6 --- /dev/null +++ b/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717918195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1156dba0-2632-11ef-bbd8-ff4fc7f3a856 + + + diff --git a/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd7c52dd64e49e75d56d6398c0747a86d5142dc2 --- /dev/null +++ b/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.23 + 100.64.54.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 1157c880-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c793bdb6b7913905fd8fb5b182f63d2de0985b08 --- /dev/null +++ b/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.235 + USER-0015-1311.example.internal + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.30 + 100.64.68.30 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.24 + 100.64.68.24 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.55.15 + 100.64.55.15 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.16 + 100.64.68.16 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + SERVICE + ["Exploited Service"] + 0.6203125 + ["Precinct"] + + + HOST + 100.64.68.17 + 100.64.68.17 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.18 + 100.64.68.18 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.25 + 100.64.68.25 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"] + + + HOST + 100.64.8.23 + USER-0015-1491.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.32 + 100.64.68.32 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.33 + 100.64.68.33 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.34 + 100.64.68.34 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115424 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 116c4870-8d60-11ee-9951-411438339097 + + + diff --git a/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3df4b02d6b6aee639fd8f4655b318469f960b8d9 --- /dev/null +++ b/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,669 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.1 + 100.64.77.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.3 + 100.64.77.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.4 + 100.64.77.4 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.5 + 100.64.77.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.6 + 100.64.77.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.7 + 100.64.77.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.28 + USER-0015-1747.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.39.173 + 100.64.39.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.55.55 + 100.64.55.55 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11726760-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61bf70afe4229f592a7381e6701a3402138398cd --- /dev/null +++ b/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.148 + 100.64.12.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269475 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 117525e0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12bcb55f8294f181d6dcdf11a5c8aa6b7125e252 --- /dev/null +++ b/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.79.251 + 100.64.79.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.46.178 + 100.64.46.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685771224 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 117b0960-01d2-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f3141cbe4e6ff29972f50b8cc72592702043711 --- /dev/null +++ b/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.35.43.252 + 10.35.43.252 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Windows Active Directory","Vulnerability Management"] + + + HOST + 100.64.70.69 + 100.64.70.69 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.70 + 100.64.70.70 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 10.30.123.149 + 10.30.123.149 + [] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.71 + 100.64.70.71 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.72 + 100.64.70.72 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.73 + 100.64.70.73 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.154 + 100.64.69.154 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.68 + 100.64.70.68 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.74 + 100.64.70.74 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.100 + 100.64.68.100 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.75 + USER-0015-1577.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + INCIDENT_LINK + 1714073770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0009","TA0010"] + ["Exploiting Target"] + complete-mission + Unprocessed + 118298e0-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04ca1bfc98458f1b5b1c6882d60b8890ac10d082 --- /dev/null +++ b/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,889 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.201 + 100.64.96.201 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.179 + 100.64.96.179 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.202 + 100.64.96.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.153 + 100.64.96.153 + ["Exploiting Host"] + 0.9525390625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.203 + 100.64.96.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.204 + 100.64.96.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.205 + 100.64.96.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.206 + USER-0015-2161.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.207 + 100.64.96.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.5.188 + 100.64.5.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.208 + 100.64.96.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.146 + 100.64.8.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.209 + 100.64.96.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.96.210 + 100.64.96.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.211 + 100.64.96.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.212 + 100.64.96.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558942 + malicious + 0.9525390625 + 0.9525390625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 118d9c30-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b12d15147fef82a734d002029f249228712753c6 --- /dev/null +++ b/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 11948ee0-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e372878a91e53733457f17d7c4804f3640d3b570 --- /dev/null +++ b/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.149 + 100.64.71.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.9 + 100.64.77.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.10 + 100.64.77.10 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.254 + 100.64.75.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.222 + 100.64.9.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d47f0-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7c72012d61c772e33ba78ed09a1266a1dad3113 --- /dev/null +++ b/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.178 + 100.64.21.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692902588 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 119d5390-42ae-11ee-912e-5fdb65c11aab + + + diff --git a/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b75ed3e72061938208181b6768a5a79cb329671 --- /dev/null +++ b/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.174 + 100.64.46.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693072669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a37120-443a-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c24afd0e002d0c23e592d460a139a0084c29dd2 --- /dev/null +++ b/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.25 + 100.64.54.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a4d710-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87ff7d963bc766d6e68b325d7a299d4d05778165 --- /dev/null +++ b/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699061571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11a57ed0-7ab2-11ee-b406-a926e032105b + + + diff --git a/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32d4e5ef4e1d35ccae60fb907a1db9d1ea97bdf2 --- /dev/null +++ b/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.191 + 100.64.58.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688041114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a61380-1677-11ee-a523-a1913ea7dc39 + + + INCIDENT_LINK + 1688041114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a61380-1677-11ee-a523-a1913ea7dc39 + + + diff --git a/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92da456074aeb383d631080a6aa82b2df8432178 --- /dev/null +++ b/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.52 + 100.64.52.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614042 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a80b90-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db481b7a8f3db458748de3e308c3c3c20c476bac --- /dev/null +++ b/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.201 + 100.64.82.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + USER-0015-1912.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Umbrella","Meraki"] + + + INCIDENT_LINK + 1688306543 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11a924f0-18e1-11ee-9b6c-2d03eea98951 + + + diff --git a/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f08055a7725e5f24267943e7b7fd39f0a6f935e7 --- /dev/null +++ b/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.150 + 100.64.12.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a97c50-21a3-11ee-86db-6b99d218dc75 + + + INCIDENT_LINK + 1689269475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11a97c50-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4a90161b3407bafff0219542aa41f91c0a59781 --- /dev/null +++ b/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.178 + 100.64.21.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692902588 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11b03f50-42ae-11ee-912e-5fdb65c11aab + + + diff --git a/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbbbd386b70261e2e991c7e29e147a8ebbc62ce1 --- /dev/null +++ b/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.25 + 100.64.54.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 11b74da0-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39806e71908ef3b5f74fb52a81d53006035aba42 --- /dev/null +++ b/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.82 + 100.64.59.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11b93870-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c73726f2241306a5c9ca9a326d6c5cc0a2de5d59 --- /dev/null +++ b/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.52 + 100.64.52.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614043 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 11c02770-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3bb0d91e9db824c1b1d931ab7100da7301699868 --- /dev/null +++ b/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.150 + 100.64.12.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 11c7b2b0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d05e3237f6ed62e6c0eef43d60cbab78a39d2e14 --- /dev/null +++ b/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.82 + 100.64.59.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767033 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11ca2860-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d84545ddcd3933837742245bd206d9eaea2a925a --- /dev/null +++ b/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.69 + 100.64.31.69 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614043 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11d18c90-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9d2adbed0ea18b1bd9338dc9693ac781c11fc2b --- /dev/null +++ b/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.84 + 100.64.59.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767034 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11d94390-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e886c74cfd044d71147050f2ba4164a64145f409 --- /dev/null +++ b/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702245001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11dff7c0-97a6-11ee-964e-058a4cfd3ea1 + + + diff --git a/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..044c784f70f79b856e11bd589c3fc4ac310e3633 --- /dev/null +++ b/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.48 + USER-0015-1437.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695870411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11e03b10-5dac-11ee-852f-d98ba2bc54fb + + + diff --git a/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..830b79b30326f138a9e46ef72120bf87be1f4a72 --- /dev/null +++ b/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.69 + 100.64.31.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711614043 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11e2caa0-ecdc-11ee-9062-4bdc9f994d60 + + + diff --git a/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dbda0ca1e4dca6e6ed92f7e57cc6394e94e2ecc --- /dev/null +++ b/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11e54510-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml b/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccd1778447fc50e24e7ec2a43633eebed44b184c --- /dev/null +++ b/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.39 + 100.64.62.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685646241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 11e76c00-00af-11ee-a095-f76b898c0626 + + + diff --git a/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..237bb717ee994d1773dfe8ba53353d83a4a7962b --- /dev/null +++ b/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702245001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 11ed1720-97a6-11ee-964e-058a4cfd3ea1 + + + diff --git a/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5560a2ac9345bd4546959f13fd1f0cd0b9ed39b8 --- /dev/null +++ b/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.14.48 + USER-0015-1437.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695870411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f2b1a0-5dac-11ee-852f-d98ba2bc54fb + + + diff --git a/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b14e2c347bdfe1c3ebad22f2a149540330dad799 --- /dev/null +++ b/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.17 + 100.64.82.17 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.16.48 + 100.64.16.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.18 + 100.64.82.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.38.41 + 100.64.38.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.20.247 + USER-0015-1910.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.4.225 + 100.64.4.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167816 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11f785d0-179e-11ee-9bde-a75d9ab1122d + + + diff --git a/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7557207fd3bdbf16898e3c82e94a87e7689e4e35 --- /dev/null +++ b/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.150 + 100.64.12.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269476 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 11fc5740-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5fd1cc3947567e14f84fc36550913d529a82427d --- /dev/null +++ b/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688165669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 1201ff60-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml b/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml new file mode 100644 index 0000000000000000000000000000000000000000..079c179654dc17ee6dd6a87e94a85a62b1f97e0f --- /dev/null +++ b/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.62.39 + 100.64.62.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685646241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12033160-00af-11ee-a095-f76b898c0626 + + + diff --git a/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0c180fcf3350dffcc261f732b2c0ed1b5355fbe --- /dev/null +++ b/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.109 + 100.64.1.109 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1668885131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 120a9d60-683e-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 120a9d60-683e-11ed-96b7-d9d8859696d0 + + + diff --git a/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee87131f7d5cdfd8fb0c31460eb8c35a913cce31 --- /dev/null +++ b/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.226.12 + 192.168.214.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.83.38 + 100.64.83.38 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.83.39 + 100.64.83.39 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687470314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 120c4140-1146-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 120c4140-1146-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 120c4140-1146-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 120c4140-1146-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..710c7078b905b69b27f94c78de9ab6362c41c806 --- /dev/null +++ b/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.8 + 100.64.38.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 120e50e0-2d91-11ee-be2e-730d4c543b4a + + + INCIDENT_LINK + 1690581159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 120e50e0-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..362363a93320e915db91f32fdb71a4cdbd8b0f0b --- /dev/null +++ b/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.250 + 100.64.47.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.251 + 100.64.47.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.252 + 100.64.47.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.96 + 100.64.21.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.253 + USER-0015-1371.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.254 + 100.64.47.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.255 + 100.64.47.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820783 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12175700-1476-11ee-877c-f76402fda8f6 + + + diff --git a/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92732b6e03f2a82a817edcb69b6bd25ed1c4a941 --- /dev/null +++ b/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688165669 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 121f9980-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cea1e91c553eac837fdaff97a81089d79b2c2b0 --- /dev/null +++ b/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.5 + 100.64.48.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.6 + 100.64.48.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.7 + 100.64.48.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.111 + 100.64.13.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.8 + 100.64.48.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.107 + 100.64.28.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.9 + 100.64.48.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.10 + 100.64.48.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.196 + 100.64.47.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.93 + 100.64.10.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 122dec40-1476-11ee-877c-f76402fda8f6 + + + diff --git a/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5c78a02a9f15c5afd1dbea3dbfdfc5417ad445d --- /dev/null +++ b/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.8 + 100.64.38.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690581159 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 1230a5f0-2d91-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61e956ea13dafa29111bdd04af7421ecabffd138 --- /dev/null +++ b/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696414584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12383660-629f-11ee-96c6-530c886f4a66 + + + diff --git a/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6aaa5cab9ae71508ea951854648fc8a6c5f96676 --- /dev/null +++ b/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.151 + 100.64.12.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 123abfd0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab706c2d029d55689f68d3acb488631591f22b0b --- /dev/null +++ b/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.52 + 100.64.52.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695419440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 123da070-5992-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a157aac357229b4c7ee54927087d644b6a62523 --- /dev/null +++ b/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml @@ -0,0 +1,653 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.17 + 100.64.48.17 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.18 + 100.64.48.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.165 + 100.64.33.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.19 + 100.64.48.19 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.20 + 100.64.48.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.21 + 100.64.48.21 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.22 + 100.64.48.22 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.23 + 100.64.48.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.29 + 100.64.39.29 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.24 + 100.64.48.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820784 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12448180-1476-11ee-877c-f76402fda8f6 + + + diff --git a/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f150b871d773cd6817fc851eeb8eabb4db4da2ad --- /dev/null +++ b/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.209 + 100.64.93.209 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718720067 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 125188f0-2d7d-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718720067 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 125188f0-2d7d-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4934e996e3f28920808571b86adcee149a514909 --- /dev/null +++ b/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.151 + 100.64.12.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 126949e0-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7c6baa23b7fbb4092478cf016c7949b8dfb1aed --- /dev/null +++ b/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.86 + 100.64.59.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767034 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12699cb0-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0d8d69aa0eae775a8dad1e6513bc638ef5239c0 --- /dev/null +++ b/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.34.239 + 100.64.34.239 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688165670 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12775670-1799-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4ca76abe1af6db3a60e3876888f51e493dd5555 --- /dev/null +++ b/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.86 + 100.64.59.86 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694767035 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 127bc520-53a3-11ee-92c0-676940819256 + + + diff --git a/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3fdd420bdbecc4fe3103bd7c6a0acdb2a66168e --- /dev/null +++ b/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.244 + 100.64.47.244 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.144.233.147 + 10.144.233.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12820560-3ca7-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239876 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12820560-3ca7-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a7f3ec00156beae48c2a5be5f63d67a5b28880f --- /dev/null +++ b/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.109 + 100.64.66.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728789 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12839230-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5a6bd5871537fb6cd7491bd6c14e0aba7f4d677 --- /dev/null +++ b/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.57.69 + USER-0015-2027.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.89.22 + 100.64.89.22 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721320241 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12882960-4523-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721320241 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12882960-4523-11ef-b505-f5f313488713 + + + diff --git a/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c31ce040985d2329b8d9a35b6c57a39654a4b76 --- /dev/null +++ b/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1694390795 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 128a7030-5037-11ee-a37e-a35a02afc742 + + + diff --git a/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed2d75e3e8898760757a962604d0acbd890bd7f9 --- /dev/null +++ b/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694390795 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 128df2a0-5037-11ee-a37e-a35a02afc742 + + + diff --git a/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b25e6d00c6c6c67e7fa35ad81f8e499fb965dc6b --- /dev/null +++ b/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.153 + 100.64.12.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689269477 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12931900-21a3-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebf284c94f7d347944f1ec75ee673aa5c075799d --- /dev/null +++ b/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.109 + 100.64.66.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728789 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12948220-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..266a9c606dd0c42cdbf958d7594da3faa90a8f3c --- /dev/null +++ b/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.111 + 100.64.66.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728789 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12a39d50-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a875f50f5c0f555afac335fd2e5c077c0eaaaff5 --- /dev/null +++ b/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.147 + 100.64.39.147 + ["Exploiting Host"] + 0.8875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688306545 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12a75b10-18e1-11ee-9b6c-2d03eea98951 + + + diff --git a/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29308af673346342a3cb3501f13415897401c68c --- /dev/null +++ b/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.52 + 100.64.30.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12aeb470-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12aeb470-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml b/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0aba79642355ce30244850430cb69e6b31da33c5 --- /dev/null +++ b/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.250 + USER-0015-1648.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656837320 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b1b330-faab-11ec-91ba-ebd515403398 + + + diff --git a/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd7bad83330c260215f81e6db4964f18da7840d5 --- /dev/null +++ b/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.111 + 100.64.66.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717728789 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12b2df90-2479-11ef-9c3a-fbc580c1c3cc + + + diff --git a/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml b/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32a2e1a4a963a4b900e582fe62a1d5feecae8b44 --- /dev/null +++ b/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.246 + 100.64.22.246 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.182 + 100.64.68.182 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.48.110 + 100.64.48.110 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.34.181 + 100.64.34.181 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932855 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12b5c580-706e-11ee-bf4b-5f6b66a218e8 + + + diff --git a/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8864bfd5ca800e0c5168c503773a8fcf9bdb5334 --- /dev/null +++ b/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.39.147 + 100.64.39.147 + ["Exploiting Host"] + 0.8875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688306545 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12b6c460-18e1-11ee-9b6c-2d03eea98951 + + + diff --git a/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfbbe1304c7f3564dd646593dd0011f566d79afe --- /dev/null +++ b/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.83 + USER-0015-1509.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690210934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12c6a110-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12c6a110-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12c6a110-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12c6a110-2a33-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa56f7af564b5a17e88469d74e114b43da07b04e --- /dev/null +++ b/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.239 + 100.64.80.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.57 + 100.64.72.57 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656410400 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d04060-f6c9-11ec-8331-939c614e3579 + + + INCIDENT_LINK + 1656410400 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d04060-f6c9-11ec-8331-939c614e3579 + + + diff --git a/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e4c9b744ff5bd7cf67d63161f793f22f477defb --- /dev/null +++ b/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.240 + 100.64.80.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.90 + USER-0015-1841.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656410400 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d1ee10-f6c9-11ec-8331-939c614e3579 + + + INCIDENT_LINK + 1656410400 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d1ee10-f6c9-11ec-8331-939c614e3579 + + + diff --git a/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml new file mode 100644 index 0000000000000000000000000000000000000000..805756b5e21ef2faae1216de9e08688a7dd88006 --- /dev/null +++ b/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.241 + 100.64.80.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656410400 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d39bc0-f6c9-11ec-8331-939c614e3579 + + + INCIDENT_LINK + 1656410400 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 12d39bc0-f6c9-11ec-8331-939c614e3579 + + + diff --git a/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdb275fec61a337c42a040dceaab4297e34f483a --- /dev/null +++ b/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.11 + 100.64.77.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.56.253 + 100.64.56.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.30.50 + 100.64.30.50 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.216 + HOST-13084 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + INCIDENT_LINK + 1687085486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12d48f70-0dc6-11ee-a3ba-756feea53057 + + + diff --git a/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ae688961f8d6be4b371239f669916edfa26de5f --- /dev/null +++ b/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.231 + 100.64.96.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.96.232 + 100.64.96.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.181 + 100.64.96.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.233 + 100.64.96.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.234 + 100.64.96.234 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.157 + 100.64.96.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.149 + 100.64.96.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.235 + 100.64.96.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.236 + 100.64.96.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.237 + 100.64.96.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.238 + 100.64.96.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.228 + 100.64.7.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.31 + 100.64.83.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.239 + 100.64.96.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.240 + 100.64.96.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.241 + 100.64.96.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.153 + 100.64.96.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.242 + 100.64.96.242 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + INCIDENT_LINK + 1663558944 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12d4c230-37cd-11ed-bbec-5f46a95001da + + + diff --git a/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f120a876fbf9f01fd4bbf909df84e94c959c9ef --- /dev/null +++ b/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.7 + 100.64.22.7 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688982144 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12dad460-1f06-11ee-984e-6dd184c65476 + + + diff --git a/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91e20c31a7de633820fb27cff62452a3827b3ec5 --- /dev/null +++ b/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.128 + 100.64.49.128 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12dc93c0-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8a685854c8dc17c82d46739f4b26484b53deca3 --- /dev/null +++ b/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.52 + 100.64.29.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696414585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12df4bd0-629f-11ee-96c6-530c886f4a66 + + + diff --git a/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c78cc7cfb34ef71bcb5f8dc1c071de84deeb6e9b --- /dev/null +++ b/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.59 + 100.64.16.59 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696414585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12eedc30-629f-11ee-96c6-530c886f4a66 + + + diff --git a/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5e55dbd8995c6604bf711d10c5a3ecba0df4cd1 --- /dev/null +++ b/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.171 + USER-0015-1791.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656410400 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 12efaf40-f6c9-11ec-8331-939c614e3579 + + + diff --git a/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cbe95add3bd91bd0463ebb9506cb9cf5ea1ae23 --- /dev/null +++ b/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.128 + 100.64.49.128 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703813525 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 12f042d0-a5ea-11ee-87e0-bf05437911b6 + + + diff --git a/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6dd4dae40bc55d77a3aec6e11e4411341ffa4b8 --- /dev/null +++ b/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.78.171 + USER-0015-1791.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656410400 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 12f55490-f6c9-11ec-8331-939c614e3579 + + +