diff --git a/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53aeedf6a240153dfb34dbf76a055a258584410e
--- /dev/null
+++ b/graph/incidents_graphml/0/08293240-3135-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.29
+ 100.64.26.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.30
+ 100.64.26.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.31
+ 100.64.26.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.32
+ 100.64.26.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719128931
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08293240-3135-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml b/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c93c20b08b5b8b8c769e4ab05beab6768ce2fea7
--- /dev/null
+++ b/graph/incidents_graphml/0/082c33f0-6b7e-11ee-8294-3ff0afe5b786.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697389954
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 082c33f0-6b7e-11ee-8294-3ff0afe5b786
+
+
+
diff --git a/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83b7ad314ce0ee2aa4c54b5e7f8a56d4c94278b5
--- /dev/null
+++ b/graph/incidents_graphml/0/082e2330-18ea-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.37.13
+ 172.30.37.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.216
+ 100.64.95.216
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716457891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 082e2330-18ea-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 082e2330-18ea-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d276ec7cde9c95454a892b463b056fe5781dacb
--- /dev/null
+++ b/graph/incidents_graphml/0/082f5100-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.50
+ 100.64.52.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 082f5100-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..498c4267984d6e4681c7669b5255891e759ce92b
--- /dev/null
+++ b/graph/incidents_graphml/0/08316590-93b6-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.108
+ 100.64.68.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701812052
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08316590-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812052
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08316590-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812052
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08316590-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812052
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08316590-93b6-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bfa36c0c311f0d565288e2a02baaf491827dec1
--- /dev/null
+++ b/graph/incidents_graphml/0/0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.194
+ 100.64.36.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704249017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0834a3a0-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79d73b27619db26fd3c3bb7340487b2ea07494f1
--- /dev/null
+++ b/graph/incidents_graphml/0/08359590-214a-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.41
+ USER-0015-1222.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.148
+ USER-0015-1223.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.42
+ 100.64.20.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.43
+ 100.64.20.43
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.45
+ 100.64.20.45
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.46
+ 100.64.20.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.47
+ 100.64.20.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231234
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08359590-214a-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml b/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7e116c9fabfc851669f7ab639ea9dc8db47da73
--- /dev/null
+++ b/graph/incidents_graphml/0/0837e4a0-7ec2-11ee-a53e-810a167207be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.93
+ 100.64.13.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699508232
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0837e4a0-7ec2-11ee-a53e-810a167207be
+
+
+
diff --git a/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml b/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1eb836669e5d0463183e1ba710b60a52fcc59b6c
--- /dev/null
+++ b/graph/incidents_graphml/0/083a3db0-6b7e-11ee-8294-3ff0afe5b786.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697389954
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 083a3db0-6b7e-11ee-8294-3ff0afe5b786
+
+
+
diff --git a/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ef1c7fbfcb67e012ed8c7ceb90ff1a72b226474
--- /dev/null
+++ b/graph/incidents_graphml/0/083e4fd0-18ea-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.8.190
+ 172.16.8.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.74
+ 100.64.87.74
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716457891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 083e4fd0-18ea-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 083e4fd0-18ea-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2db40296e4c1a07b52820f8a27cdf5a4405bb17
--- /dev/null
+++ b/graph/incidents_graphml/0/08432290-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.142
+ 100.64.94.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.190.96.179
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704249017
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08432290-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml b/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40e73392b8df57df76c3142cff32a4373e28a297
--- /dev/null
+++ b/graph/incidents_graphml/0/084fd970-7ec2-11ee-a53e-810a167207be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.93
+ 100.64.13.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699508232
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 084fd970-7ec2-11ee-a53e-810a167207be
+
+
+
diff --git a/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00ab92921203f7eaab820d93fbedcbb3bbe2f87a
--- /dev/null
+++ b/graph/incidents_graphml/0/085523f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.142
+ 100.64.94.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704249017
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 085523f0-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc3b41eba33d09372c634f6dfa91596dbc7145b3
--- /dev/null
+++ b/graph/incidents_graphml/0/0865f080-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.164
+ USER-0015-1393.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0865f080-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c170a1e372e5839cc646e122ba430595d8a2c753
--- /dev/null
+++ b/graph/incidents_graphml/0/086fb180-61fa-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.248
+ 100.64.40.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 086fb180-61fa-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7fae7201c18740e436918844bcfe19e7f583860
--- /dev/null
+++ b/graph/incidents_graphml/0/0870a540-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285753
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0870a540-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1312c3f77236a3292bdae935b17c991a439b6da6
--- /dev/null
+++ b/graph/incidents_graphml/0/087e3070-61fa-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.248
+ 100.64.40.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 087e3070-61fa-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml b/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4de1a9f07a6e21603af1d7f589f770e3dacf5673
--- /dev/null
+++ b/graph/incidents_graphml/0/088165f0-09d7-11ed-b518-5f11683c5c90.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658505468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088165f0-09d7-11ed-b518-5f11683c5c90
+
+
+ INCIDENT_LINK
+ 1658505468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088165f0-09d7-11ed-b518-5f11683c5c90
+
+
+
diff --git a/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33006cd402da7a858ade50a04bc22b1ab7b2c9e2
--- /dev/null
+++ b/graph/incidents_graphml/0/08820df0-50bf-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.255
+ 100.64.71.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.187
+ 100.64.82.187
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1666301693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08820df0-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08820df0-50bf-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8b240665be8c23cb2d644f753cff0f875a83f77
--- /dev/null
+++ b/graph/incidents_graphml/0/08871f20-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.113
+ 100.64.59.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08871f20-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35ec25b6a7933c8dc1b75da92f2465ba0f94fd18
--- /dev/null
+++ b/graph/incidents_graphml/0/088b76e0-61fa-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.250
+ 100.64.40.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088b76e0-61fa-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088b76e0-61fa-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088b76e0-61fa-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088b76e0-61fa-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696343700
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 088b76e0-61fa-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8daf6305221ade287ea3d17d17bdb8009639f9a
--- /dev/null
+++ b/graph/incidents_graphml/0/08921200-1340-11ef-90d6-79b9e3bf2217.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.14
+ 100.64.2.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.54
+ 100.64.13.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.98
+ 100.64.55.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.3
+ 100.64.13.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.225
+ 100.64.56.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.181
+ 100.64.20.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.226
+ 100.64.56.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.56.227
+ 100.64.56.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.228
+ 100.64.56.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835121
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08921200-1340-11ef-90d6-79b9e3bf2217
+
+
+
diff --git a/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc6068a118defdbda39291fb8f4856eb71f74368
--- /dev/null
+++ b/graph/incidents_graphml/0/08a25fb0-ee31-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.32
+ 100.64.80.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ 100.64.1.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08a25fb0-ee31-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08a25fb0-ee31-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml b/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75d1b59a06f43220453d65610e7c04a8184d087c
--- /dev/null
+++ b/graph/incidents_graphml/0/08ad89b0-eb04-11ec-ab19-e1eaa4a88f94.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.106
+ 100.64.73.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.182
+ 100.64.76.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.200
+ USER-0015-1793.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.124
+ 100.64.71.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.2.213
+ USER-0015-1421.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+ INCIDENT_LINK
+ 1655116309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ad89b0-eb04-11ec-ab19-e1eaa4a88f94
+
+
+
diff --git a/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39aba53c64bcdaa7069125f94b416bbd61e18470
--- /dev/null
+++ b/graph/incidents_graphml/0/08b3a8b0-cf71-11ee-9f4f-f950118d6926.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.121
+ 100.64.50.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708379488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b3a8b0-cf71-11ee-9f4f-f950118d6926
+
+
+
diff --git a/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37a31d702435bfdba81cae10f1919fc4410d399e
--- /dev/null
+++ b/graph/incidents_graphml/0/08b58040-4402-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.239
+ 100.64.26.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.247
+ 100.64.62.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.248
+ 100.64.62.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.249
+ 100.64.62.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.250
+ 100.64.62.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.109
+ 100.64.8.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.230
+ 100.64.7.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.196
+ 100.64.35.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.84
+ 100.64.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b58040-4402-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f225da41590d82cadaddd20ee6bf29b2e093696
--- /dev/null
+++ b/graph/incidents_graphml/0/08b71a40-4fb0-11ee-bb6d-6beb4ab99de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.192
+ 100.64.32.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694332797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08b71a40-4fb0-11ee-bb6d-6beb4ab99de5
+
+
+
diff --git a/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6762c31fe0e37b502104e8733e44b230f87864c7
--- /dev/null
+++ b/graph/incidents_graphml/0/08baa740-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.200
+ 100.64.44.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.245
+ 100.64.76.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.15.138
+ 100.64.15.138
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687085469
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08baa740-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085469
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08baa740-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085469
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08baa740-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085469
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08baa740-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bce31a082f654c95f20487811b3e7b8db9d9241
--- /dev/null
+++ b/graph/incidents_graphml/0/08bcb5c0-fad0-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.213
+ 100.64.45.213
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000692
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08bcb5c0-fad0-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9a7bbcba1f6470f734add3e734d6a29975ed9ac
--- /dev/null
+++ b/graph/incidents_graphml/0/08c128e0-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.50.40
+ 192.168.50.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.49
+ 100.64.83.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688041100
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08c128e0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041100
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 08c128e0-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b30f45764295dffa900b4cb15381e8744a493b0f
--- /dev/null
+++ b/graph/incidents_graphml/0/08c498a0-cf71-11ee-9f4f-f950118d6926.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.121
+ 100.64.50.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708379488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08c498a0-cf71-11ee-9f4f-f950118d6926
+
+
+
diff --git a/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml b/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d6ab1d49b84179bdc1669553d981ceac9a81ea4
--- /dev/null
+++ b/graph/incidents_graphml/0/08c5c040-4fb0-11ee-bb6d-6beb4ab99de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.192
+ 100.64.32.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694332797
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08c5c040-4fb0-11ee-bb6d-6beb4ab99de5
+
+
+
diff --git a/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c208480eb67f50c1148b102b74c68196ff777a22
--- /dev/null
+++ b/graph/incidents_graphml/0/08cbd1a0-281a-11ee-b06f-b17f5f626799.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689980277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 08cbd1a0-281a-11ee-b06f-b17f5f626799
+
+
+
diff --git a/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05056e511120ab5426b0f37fd8dea4e3ff6cdb5b
--- /dev/null
+++ b/graph/incidents_graphml/0/08d22d30-cf71-11ee-9f4f-f950118d6926.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708379488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 08d22d30-cf71-11ee-9f4f-f950118d6926
+
+
+
diff --git a/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cbcd0cfb6257674a26f1ea9c1223ae1a8cf83c5
--- /dev/null
+++ b/graph/incidents_graphml/0/08dcf190-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.31.25
+ 100.64.31.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704249018
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08dcf190-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9037363491c7018bcbc992afa05ea0d16ea499e
--- /dev/null
+++ b/graph/incidents_graphml/0/08e18730-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.108
+ 100.64.92.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001184
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e18730-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53592bdfa7105b1ab9dee7558cd886ac95dd327e
--- /dev/null
+++ b/graph/incidents_graphml/0/08e3d310-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.166
+ 100.64.51.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e3d310-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f21c276a9aefc55d178348a7e97f5c5dce76e99c
--- /dev/null
+++ b/graph/incidents_graphml/0/08e53880-dfa2-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.125
+ 100.64.17.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.21.1
+ 100.64.21.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.190
+ 100.64.70.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e53880-dfa2-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52013ec0b7a35c075fa1cf103e23e18d5bfe65e7
--- /dev/null
+++ b/graph/incidents_graphml/0/08e88c10-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.108
+ 100.64.92.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001184
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08e88c10-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42407024b5b48e0821767322a0c4d7f45e0ee489
--- /dev/null
+++ b/graph/incidents_graphml/0/08e95ce0-18ea-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.218
+ 100.64.95.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1716457892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08e95ce0-18ea-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcc212b6734d6af63a9a66c74e04e571524b4f0c
--- /dev/null
+++ b/graph/incidents_graphml/0/08ea8430-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.168
+ 100.64.35.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08ea8430-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..897736a025973a983bc825c5de42a358aaa0ec2e
--- /dev/null
+++ b/graph/incidents_graphml/0/08eaaef0-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.110
+ 100.64.92.110
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678001184
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08eaaef0-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa3e2d52e60268252d5981d9e201c52091162c30
--- /dev/null
+++ b/graph/incidents_graphml/0/08ede340-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.110
+ 100.64.92.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001184
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08ede340-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml b/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef12d01a1a817d4750312129f519d642e9e55a2f
--- /dev/null
+++ b/graph/incidents_graphml/0/08f23850-cf71-11ee-9f4f-f950118d6926.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.123
+ 100.64.50.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708379488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 08f23850-cf71-11ee-9f4f-f950118d6926
+
+
+
diff --git a/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3309d7d3e74667c5d26ded478a7cba9952cdd096
--- /dev/null
+++ b/graph/incidents_graphml/0/08f670b0-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.166
+ 100.64.51.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851574
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 08f670b0-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a0d6221a43f483046e6e8a1a6823ca091b9205a
--- /dev/null
+++ b/graph/incidents_graphml/0/090410d0-18ea-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.95.218
+ 100.64.95.218
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716457892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 090410d0-18ea-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e1602d2dc11949912a73b76f1307dac69550447
--- /dev/null
+++ b/graph/incidents_graphml/0/09061110-d3e8-11ee-bf59-a9ad7cebab5f.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.106
+ 100.64.8.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.107
+ 100.64.8.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.108
+ 100.64.8.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.109
+ 100.64.8.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.111
+ 100.64.8.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.113
+ 100.64.8.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.114
+ 100.64.8.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.115
+ 100.64.8.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.116
+ 100.64.8.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.117
+ 100.64.8.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.118
+ 100.64.8.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.119
+ 100.64.8.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.121
+ 100.64.8.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.122
+ 100.64.8.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870403
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09061110-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+
diff --git a/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml b/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5733a069dcc42576aaa72eb890b5fe85f93897d9
--- /dev/null
+++ b/graph/incidents_graphml/0/09125650-004a-11ed-825e-31048ffbcace.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657455349
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09125650-004a-11ed-825e-31048ffbcace
+
+
+ INCIDENT_LINK
+ 1657455349
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09125650-004a-11ed-825e-31048ffbcace
+
+
+
diff --git a/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39c42e744e01fa7fd0549700640e9268714c9f1f
--- /dev/null
+++ b/graph/incidents_graphml/0/0912fc70-1c98-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.235
+ 100.64.76.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.236
+ 100.64.76.236
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688714980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0912fc70-1c98-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0912fc70-1c98-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0912fc70-1c98-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0912fc70-1c98-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8c565fe4b756c2c3e4c9796245ff8a4f74722f0
--- /dev/null
+++ b/graph/incidents_graphml/0/091664b0-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.181
+ 100.64.91.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660367767
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 091664b0-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..478a93907ce58d84397d356969beb661b0c5f7e4
--- /dev/null
+++ b/graph/incidents_graphml/0/09169f30-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.144
+ 100.64.94.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1704249018
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09169f30-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c50c3f4649c3337b5582fbcff4a0bf18c53279e5
--- /dev/null
+++ b/graph/incidents_graphml/0/0921d660-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.181
+ 100.64.91.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660367767
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0921d660-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f74ef4f1933ae66667d1f52836402d9489f79504
--- /dev/null
+++ b/graph/incidents_graphml/0/09264680-2d7d-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.27.224
+ 100.64.27.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.225
+ 100.64.4.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.207
+ 100.64.93.207
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720052
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09264680-2d7d-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2b5c3bdc3509755f59f89b6e84554be0a7cf04a
--- /dev/null
+++ b/graph/incidents_graphml/0/0928e4f0-2632-11ef-bbd8-ff4fc7f3a856.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717918181
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0928e4f0-2632-11ef-bbd8-ff4fc7f3a856
+
+
+
diff --git a/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7d79d9f9c37e240ea353a8726bd2f2b9f66fe34
--- /dev/null
+++ b/graph/incidents_graphml/0/092c7120-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.144
+ 100.64.94.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1704249018
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 092c7120-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml b/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cac6c53884c6e83ff82868bd9964b6da8f681fa3
--- /dev/null
+++ b/graph/incidents_graphml/0/093696d0-4f29-11ee-8f95-3f205431a8e8.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.169
+ USER-0015-1299.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.170
+ 100.64.33.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.67
+ 100.64.8.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.32
+ 100.64.30.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+ INCIDENT_LINK
+ 1694274816
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 093696d0-4f29-11ee-8f95-3f205431a8e8
+
+
+
diff --git a/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4227c2a7eb86ff9fae754237a1819c3fa50b0798
--- /dev/null
+++ b/graph/incidents_graphml/0/0941b0e0-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.202
+ 100.64.57.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285754
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0941b0e0-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7aa74750b85a9caef1d26a5d20d3fe70204e6c6f
--- /dev/null
+++ b/graph/incidents_graphml/0/09474a00-70e6-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.78
+ 100.64.68.78
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.42.4
+ 100.64.42.4
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09474a00-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09474a00-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09474a00-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09474a00-70e6-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af735d38ab82c0ab4c35efec124951b358fc8d72
--- /dev/null
+++ b/graph/incidents_graphml/0/09483460-70e6-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.114
+ 100.64.64.114
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09483460-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09483460-70e6-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4044012975449cdd7c789b7c5e48cb14a949980d
--- /dev/null
+++ b/graph/incidents_graphml/0/0950a500-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.202
+ 100.64.57.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285754
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0950a500-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d4a5afbdecf0069e9b5e582c97ed623bffbe7c8
--- /dev/null
+++ b/graph/incidents_graphml/0/09532250-42ae-11ee-912e-5fdb65c11aab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692902574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09532250-42ae-11ee-912e-5fdb65c11aab
+
+
+
diff --git a/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml b/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bbba9900e5c9f87e675ea1640b8ecb5f6f14a96
--- /dev/null
+++ b/graph/incidents_graphml/0/0954fce0-9c9c-11ee-aed3-e3a8c1c11880.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.26
+ 100.64.31.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702790448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0954fce0-9c9c-11ee-aed3-e3a8c1c11880
+
+
+
diff --git a/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4faf8ce1d763c45f0280fbdfc559dedc114a7aed
--- /dev/null
+++ b/graph/incidents_graphml/0/09554600-533c-11ed-82ec-e7a72760a0c9.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.216
+ 100.64.94.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.217
+ 100.64.94.217
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.218
+ 100.64.94.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.219
+ 100.64.94.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.220
+ 100.64.94.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.221
+ 100.64.94.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.222
+ 100.64.94.222
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.223
+ 100.64.94.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.224
+ 100.64.94.224
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.225
+ 100.64.94.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.226
+ 100.64.94.226
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.45
+ 100.64.13.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.227
+ 100.64.94.227
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.242
+ 100.64.90.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.228
+ 100.64.94.228
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.229
+ 100.64.94.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575283
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09554600-533c-11ed-82ec-e7a72760a0c9
+
+
+
diff --git a/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04609318d78237cc5ce826585f9effce9676286a
--- /dev/null
+++ b/graph/incidents_graphml/0/0955c750-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.92
+ 100.64.21.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521126
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0955c750-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f33bca8381459b669c2b87a7d79ed66c1c09e03
--- /dev/null
+++ b/graph/incidents_graphml/0/09605c70-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.204
+ 100.64.57.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285754
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09605c70-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc1c9fc36d71bf2cd24102b3b5c0060368ff8ac3
--- /dev/null
+++ b/graph/incidents_graphml/0/0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.52
+ 100.64.63.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704249019
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0961b1f0-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml b/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d92faba2a62b48f08526271d2fd1b1750690d96
--- /dev/null
+++ b/graph/incidents_graphml/0/09646df0-004a-11ed-825e-31048ffbcace.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.200
+ USER-0015-1793.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.26.101
+ 100.64.26.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.194
+ 100.64.78.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657455350
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09646df0-004a-11ed-825e-31048ffbcace
+
+
+ INCIDENT_LINK
+ 1657455350
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09646df0-004a-11ed-825e-31048ffbcace
+
+
+ INCIDENT_LINK
+ 1657455350
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09646df0-004a-11ed-825e-31048ffbcace
+
+
+ INCIDENT_LINK
+ 1657455350
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09646df0-004a-11ed-825e-31048ffbcace
+
+
+
diff --git a/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14563e09461b0a17a4a8962654c2fb5201448144
--- /dev/null
+++ b/graph/incidents_graphml/0/09654280-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.111
+ USER-0015-2048.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ HOST-17989
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.182
+ 100.64.90.182
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720389076
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09654280-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389076
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09654280-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389076
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09654280-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389076
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09654280-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40ab7329d3cee15eabeec72092ad0e155cef09a7
--- /dev/null
+++ b/graph/incidents_graphml/0/0966aa50-42ae-11ee-912e-5fdb65c11aab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692902574
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0966aa50-42ae-11ee-912e-5fdb65c11aab
+
+
+
diff --git a/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4efbdaf1f60a0319c3e9c65c11e95327fb30aa8f
--- /dev/null
+++ b/graph/incidents_graphml/0/096a39b0-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.92
+ 100.64.21.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521126
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 096a39b0-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml b/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a52f8ee3ecc18e021ecc8b317e476740ac255ea6
--- /dev/null
+++ b/graph/incidents_graphml/0/0975d630-a9e0-11ee-ad25-ed0dad3b42f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.63.52
+ 100.64.63.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704249019
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0975d630-a9e0-11ee-ad25-ed0dad3b42f5
+
+
+
diff --git a/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml b/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c41f52654e212c9259b42a84761ba83c47a11c80
--- /dev/null
+++ b/graph/incidents_graphml/0/09775590-2967-11ee-80bc-6f53269df3bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.117
+ 100.64.59.117
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690123301
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09775590-2967-11ee-80bc-6f53269df3bb
+
+
+
diff --git a/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8344303c17201e318fe016952f2012d7fa674c7d
--- /dev/null
+++ b/graph/incidents_graphml/0/09855da0-281a-11ee-b06f-b17f5f626799.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.125
+ 100.64.65.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689980279
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09855da0-281a-11ee-b06f-b17f5f626799
+
+
+
diff --git a/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b939e166f6829634ff1904473f1b13a7c45fa8e
--- /dev/null
+++ b/graph/incidents_graphml/0/0988df40-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.210
+ 100.64.93.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0988df40-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml b/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f08c2f7ac874ab38989a25cf3b6db70089600f66
--- /dev/null
+++ b/graph/incidents_graphml/0/098a4150-2967-11ee-80bc-6f53269df3bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.117
+ 100.64.59.117
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690123301
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 098a4150-2967-11ee-80bc-6f53269df3bb
+
+
+
diff --git a/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52b9c9a585fcac0dd82c8f01bcddbf1f5ba9783e
--- /dev/null
+++ b/graph/incidents_graphml/0/098b71b0-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892862
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 098b71b0-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a776d07381ba2f9ad7716b6be4df64e73e9a9068
--- /dev/null
+++ b/graph/incidents_graphml/0/098e9200-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.168
+ 100.64.51.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 098e9200-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dc65310ea391126dbc52db1583ca51ce46d99c4
--- /dev/null
+++ b/graph/incidents_graphml/0/098ef9c0-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.210
+ 100.64.93.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 098ef9c0-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd03f6b9fe1c6ea0c37eec1c60ed21e4e009e050
--- /dev/null
+++ b/graph/incidents_graphml/0/09944750-d3e8-11ee-bf59-a9ad7cebab5f.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.144
+ 100.64.8.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.145
+ 100.64.8.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.146
+ 100.64.8.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.147
+ 100.64.8.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.148
+ 100.64.8.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.149
+ 100.64.8.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.151
+ 100.64.8.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.152
+ 100.64.8.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.60
+ 100.64.6.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.154
+ 100.64.8.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.155
+ 100.64.8.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.156
+ 100.64.8.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+ INCIDENT_LINK
+ 1708870404
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09944750-d3e8-11ee-bf59-a9ad7cebab5f
+
+
+
diff --git a/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba74c6273f443bc3115847ddd75e0dfee82f6ff3
--- /dev/null
+++ b/graph/incidents_graphml/0/099625b0-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.212
+ 100.64.93.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 099625b0-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98f3b1f188f1b7e36bc9d2e30e6d6bb2c94beb31
--- /dev/null
+++ b/graph/incidents_graphml/0/099ee420-294e-11ee-b379-83a6d20dc4b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.112
+ USER-0015-1331.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690112564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 099ee420-294e-11ee-b379-83a6d20dc4b8
+
+
+
diff --git a/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aaa22197b1b8c1f80348514b17ff8a5c31049eab
--- /dev/null
+++ b/graph/incidents_graphml/0/09a00b20-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892862
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09a00b20-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..534376c18df42cce83d59c7c699b147f9cf05b72
--- /dev/null
+++ b/graph/incidents_graphml/0/09a1a4d0-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.168
+ 100.64.51.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09a1a4d0-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ee4f40b6974ee132a630d01966b823120296bfc
--- /dev/null
+++ b/graph/incidents_graphml/0/09a87530-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.212
+ 100.64.93.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09a87530-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1e0d4a9080b7b9d9e9c25306642cac7b9afa27b
--- /dev/null
+++ b/graph/incidents_graphml/0/09ace7d0-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.112
+ 100.64.73.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.123
+ 100.64.78.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09ace7d0-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09ace7d0-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09ace7d0-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09ace7d0-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abab1f114de72651f72f0de965c831eff63d9ca9
--- /dev/null
+++ b/graph/incidents_graphml/0/09ad0910-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.1
+ 100.64.51.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09ad0910-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ace73177eafac49f57ce78b2e793cc144770c1c
--- /dev/null
+++ b/graph/incidents_graphml/0/09b309f0-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.170
+ 100.64.51.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09b309f0-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d066f044340f0cde689a32b4eaa2c33291dfa442
--- /dev/null
+++ b/graph/incidents_graphml/0/09b45c10-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.1
+ 100.64.51.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09b45c10-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf3163e75b0f0fb9c78a9a8bf6b83d9dc47d9368
--- /dev/null
+++ b/graph/incidents_graphml/0/09b615a0-294e-11ee-b379-83a6d20dc4b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.112
+ USER-0015-1331.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690112564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09b615a0-294e-11ee-b379-83a6d20dc4b8
+
+
+
diff --git a/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml b/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dce51536d084f80350d42f6b2d6191028f720bda
--- /dev/null
+++ b/graph/incidents_graphml/0/09c3abc0-0a4e-11ef-96bf-b7c516f33db0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.170
+ 100.64.51.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714851576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09c3abc0-0a4e-11ef-96bf-b7c516f33db0
+
+
+
diff --git a/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..992826a100cb458e28c23c020ae111389569d86d
--- /dev/null
+++ b/graph/incidents_graphml/0/09c82c90-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.108
+ 100.64.49.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09c82c90-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fef4092a970be1645684838c01679f449c48a62e
--- /dev/null
+++ b/graph/incidents_graphml/0/09cdd160-533c-11ed-82ec-e7a72760a0c9.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.254
+ 100.64.94.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.255
+ 100.64.94.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.1
+ 100.64.95.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.1
+ 100.64.95.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.2
+ 100.64.95.2
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.3
+ 100.64.95.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.4
+ 100.64.95.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.5
+ 100.64.95.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.6
+ 100.64.95.6
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.7
+ 100.64.95.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.78.205
+ 100.64.78.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.8
+ 100.64.95.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+ INCIDENT_LINK
+ 1666575284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09cdd160-533c-11ed-82ec-e7a72760a0c9
+
+
+
diff --git a/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fd3849fc6af5e37c9109814b07a624404309e8e
--- /dev/null
+++ b/graph/incidents_graphml/0/09d117b0-294e-11ee-b379-83a6d20dc4b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.47
+ 100.64.33.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690112564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09d117b0-294e-11ee-b379-83a6d20dc4b8
+
+
+
diff --git a/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ca2a7a67539d990aa0b7248ecb6064848d9b92b
--- /dev/null
+++ b/graph/incidents_graphml/0/09d1ac70-f30b-11ee-9a5d-cb0254535644.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712293923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09d1ac70-f30b-11ee-9a5d-cb0254535644
+
+
+
diff --git a/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cfafd6288c077983d3f0bac1bf141a2af90eca8
--- /dev/null
+++ b/graph/incidents_graphml/0/09d4e230-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.124
+ 100.64.78.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09d4e230-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09d4e230-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09d4e230-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670660
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09d4e230-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b043e8adeb2663a0d166afec8b4275fc40ce1acf
--- /dev/null
+++ b/graph/incidents_graphml/0/09d53ab0-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.155
+ 100.64.14.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09d53ab0-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeb843fb8730a7a283d47327b9af075409375e71
--- /dev/null
+++ b/graph/incidents_graphml/0/09d5c120-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.108
+ 100.64.49.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09d5c120-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7477cc022e0e2fcbdae196ef4970ee14597a4bf5
--- /dev/null
+++ b/graph/incidents_graphml/0/09e455e0-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.155
+ 100.64.14.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09e455e0-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7aed41f5a99ac6ceb6ca2c8be0c13f6f9ad1d4d4
--- /dev/null
+++ b/graph/incidents_graphml/0/09e52a70-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.110
+ 100.64.49.110
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 09e52a70-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af062585d64a67c2e7bcd4a1e60b03f805aa3c12
--- /dev/null
+++ b/graph/incidents_graphml/0/09f19c50-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.176
+ 100.64.11.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09f19c50-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e214084ce8e13aeb4a81564d464b7836e1ccfdfa
--- /dev/null
+++ b/graph/incidents_graphml/0/09f27140-5ed6-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,805 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.79
+ 100.64.61.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.132
+ 100.64.35.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.80
+ 100.64.61.80
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.46
+ 100.64.61.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.224
+ 100.64.27.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.37
+ 100.64.61.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.9071875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.38
+ 100.64.61.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.144
+ 100.64.15.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.39
+ 100.64.61.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.121
+ 100.64.6.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.81
+ 100.64.61.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.71
+ 100.64.38.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.10
+ 100.64.12.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.172
+ 100.64.30.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.124
+ 100.64.11.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.82
+ 100.64.61.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.68
+ 100.64.22.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695998387
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 09f27140-5ed6-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9e9fe12962ed1175b12a06e1ca7d320d1882b04
--- /dev/null
+++ b/graph/incidents_graphml/0/09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 09f4e1e0-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90f6f04f16f717dedfcd3e2f84fc3d851b541859
--- /dev/null
+++ b/graph/incidents_graphml/0/09f6cf40-7a7b-11ee-80a6-c94063211ff4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.220
+ 100.64.30.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 09f6cf40-7a7b-11ee-80a6-c94063211ff4
+
+
+
diff --git a/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3a0b1f6a3632827d4a466124f8bba81566fe2ce
--- /dev/null
+++ b/graph/incidents_graphml/0/0a013df0-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.32
+ 100.64.12.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a013df0-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62f2618b81a4206e24d1ad8b89f1feb74d313277
--- /dev/null
+++ b/graph/incidents_graphml/0/0a017ad0-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.176
+ 100.64.11.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a017ad0-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53dc486804d956e5d36bcff8f4d4d3a69d0398c4
--- /dev/null
+++ b/graph/incidents_graphml/0/0a065fa0-7a7b-11ee-80a6-c94063211ff4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.220
+ 100.64.30.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a065fa0-7a7b-11ee-80a6-c94063211ff4
+
+
+
diff --git a/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc4e095a6180dff055295110e7aef0bccc3446be
--- /dev/null
+++ b/graph/incidents_graphml/0/0a069bd0-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a069bd0-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea85778b70b8b96ccf7cc0f8d28da0d2478beedb
--- /dev/null
+++ b/graph/incidents_graphml/0/0a0962d0-a79f-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,423 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.230
+ 100.64.10.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.232
+ 100.64.10.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.233
+ 100.64.10.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.234
+ 100.64.10.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.236
+ USER-0015-1194.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.237
+ 100.64.10.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.238
+ 100.64.10.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001200
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a0962d0-a79f-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef2054073855156b3299e913b9d700f523841035
--- /dev/null
+++ b/graph/incidents_graphml/0/0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.32
+ 100.64.12.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a0f95d0-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d98390a834fd0d202bf12ec695484acc784aef9
--- /dev/null
+++ b/graph/incidents_graphml/0/0a119200-10b6-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.63
+ 100.64.68.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.16.70
+ 100.64.16.70
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1687408453
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a119200-10b6-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408453
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a119200-10b6-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408453
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a119200-10b6-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408453
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a119200-10b6-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7aa843c8d57279174bb918148edf319be5d53ba
--- /dev/null
+++ b/graph/incidents_graphml/0/0a12bbb0-7a7b-11ee-80a6-c94063211ff4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.161
+ 100.64.66.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a12bbb0-7a7b-11ee-80a6-c94063211ff4
+
+
+
diff --git a/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d4c40e485cd0c297b6802618c918a0b956956d6
--- /dev/null
+++ b/graph/incidents_graphml/0/0a142ba0-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.175
+ 100.64.26.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a142ba0-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49d52d490ae838fdc08a47743b7852ec1a2fc068
--- /dev/null
+++ b/graph/incidents_graphml/0/0a169510-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678309994
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a169510-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ff0234467df8237178ecb0b6c100201577f4366
--- /dev/null
+++ b/graph/incidents_graphml/0/0a19f070-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.195
+ 100.64.89.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678309994
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a19f070-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc1e2829efc3d09ed6d6e5845258e98c0a5dc079
--- /dev/null
+++ b/graph/incidents_graphml/0/0a1ef980-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.195
+ 100.64.89.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678309994
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a1ef980-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..313945d8755cac6055ffdb57c7f169d5084b272f
--- /dev/null
+++ b/graph/incidents_graphml/0/0a1fb400-7a7b-11ee-80a6-c94063211ff4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.161
+ 100.64.66.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a1fb400-7a7b-11ee-80a6-c94063211ff4
+
+
+
diff --git a/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d978831f39b5a7c04f7a16d06902f3963b63eab1
--- /dev/null
+++ b/graph/incidents_graphml/0/0a201090-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.194
+ 100.64.11.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a201090-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be4430174a669020fb311226da3adba733e46204
--- /dev/null
+++ b/graph/incidents_graphml/0/0a239110-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,215 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.97
+ 100.64.59.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.196
+ 100.64.16.196
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a239110-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e1d897b3b0489a1690b73b1efb31fbd45f18f3c
--- /dev/null
+++ b/graph/incidents_graphml/0/0a23e310-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.175
+ 100.64.26.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717516174
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a23e310-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3bcc28c44218d2a5d464c8aafd44ef6a42bb92a8
--- /dev/null
+++ b/graph/incidents_graphml/0/0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.194
+ 100.64.11.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694892863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a2f04b0-54c8-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2506bc59d1199d42eb1c419f510687ef0af2a5ac
--- /dev/null
+++ b/graph/incidents_graphml/0/0a32eeb0-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,619 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.206
+ 100.64.57.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.207
+ 100.64.57.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.208
+ 100.64.57.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.209
+ 100.64.57.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.190
+ 100.64.18.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.179
+ 100.64.17.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.210
+ 100.64.57.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.88
+ 100.64.18.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.60
+ 100.64.18.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.211
+ 100.64.57.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.142
+ 100.64.21.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699285756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a32eeb0-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e65a4ad481681569fa4851266c8e58af6b6f6cfe
--- /dev/null
+++ b/graph/incidents_graphml/0/0a3a49b0-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.188
+ 100.64.84.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678309994
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a3a49b0-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a949707c4aaa7ffc65239ec2a62a4c3b7139614
--- /dev/null
+++ b/graph/incidents_graphml/0/0a3e7870-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.136
+ 100.64.24.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.137
+ 100.64.24.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1713583702
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a3e7870-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583702
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a3e7870-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583702
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a3e7870-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583702
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a3e7870-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5fd17498a849620f8cafaee9bb8f43735d014d3
--- /dev/null
+++ b/graph/incidents_graphml/0/0a3f04a0-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.84.188
+ 100.64.84.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678309994
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a3f04a0-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml b/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee3308da111b8a6fe16294a870ef20052730aa77
--- /dev/null
+++ b/graph/incidents_graphml/0/0a4cde80-7a7b-11ee-80a6-c94063211ff4.graphml
@@ -0,0 +1,635 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.163
+ 100.64.66.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.164
+ 100.64.66.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.36
+ 100.64.18.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.165
+ 100.64.66.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.166
+ 100.64.66.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.167
+ 100.64.66.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.168
+ 100.64.66.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.169
+ 100.64.66.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.170
+ 100.64.66.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.247
+ 100.64.20.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+ INCIDENT_LINK
+ 1699037936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a4cde80-7a7b-11ee-80a6-c94063211ff4
+
+
+
diff --git a/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fed6a362802c0531f2ebd2c6beb4ec50ea8e9af9
--- /dev/null
+++ b/graph/incidents_graphml/0/0a522f30-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.179
+ 100.64.12.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129121
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0a522f30-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9055c4e6ab5d7edc97ecd46c176491af07758ab6
--- /dev/null
+++ b/graph/incidents_graphml/0/0a5891c0-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.50
+ 100.64.83.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.38.61
+ 100.64.38.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688041102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a5891c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a5891c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a5891c0-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a5891c0-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml b/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1bf551b35d20a6cfaf704b6d6aac3ce03617892
--- /dev/null
+++ b/graph/incidents_graphml/0/0a662bc0-294e-11ee-b379-83a6d20dc4b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.232
+ 100.64.36.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690112565
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a662bc0-294e-11ee-b379-83a6d20dc4b8
+
+
+
diff --git a/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..479538749e068da8b2c08328cd20d71e3ff8e1cc
--- /dev/null
+++ b/graph/incidents_graphml/0/0a6bfd40-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.50
+ 100.64.30.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699355
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a6bfd40-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699355
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a6bfd40-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df7805dcded04e54c99fc94ae940abefaa102556
--- /dev/null
+++ b/graph/incidents_graphml/0/0a715d70-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193705
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0a715d70-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml b/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a93fcf9a1d5f24aaa5880a91c17da17060b6f343
--- /dev/null
+++ b/graph/incidents_graphml/0/0a78cfa0-286d-11ee-a80a-874bd8e06d7d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690015928
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a78cfa0-286d-11ee-a80a-874bd8e06d7d
+
+
+
diff --git a/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daf4221b77df0bde102724653c44fc759a32dba7
--- /dev/null
+++ b/graph/incidents_graphml/0/0a8ac2d0-01d2-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.250
+ 100.64.79.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685771212
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a8ac2d0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771212
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a8ac2d0-01d2-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d2882d2aa45b18c088ace3cfe5046402ea6dba9
--- /dev/null
+++ b/graph/incidents_graphml/0/0a8e1550-0859-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.184
+ 100.64.97.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714636399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a8e1550-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a8e1550-0859-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58b8fb386f8f9ed0135dbdb05a8516c47686b89e
--- /dev/null
+++ b/graph/incidents_graphml/0/0a8f94a0-ffec-11ed-97eb-05d23f72b81e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.249
+ 100.64.44.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685562477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a8f94a0-ffec-11ed-97eb-05d23f72b81e
+
+
+
diff --git a/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml b/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ef69dc72fa512fa99fab37bc30a0c4d27695d3e
--- /dev/null
+++ b/graph/incidents_graphml/0/0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.104
+ 100.64.77.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.105
+ 100.64.77.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664557939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+ INCIDENT_LINK
+ 1664557939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0a9193e0-40e3-11ed-ab2f-0f75c1e7adcb
+
+
+
diff --git a/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2e424a9249a430d10bb0d25fc42a809eb756092
--- /dev/null
+++ b/graph/incidents_graphml/0/0a941010-df99-11ee-b293-9383286c6129.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.251
+ 100.64.20.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.252
+ 100.64.20.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.253
+ 100.64.20.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.254
+ 100.64.20.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.255
+ 100.64.20.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.1
+ 100.64.21.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.1
+ 100.64.21.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.2
+ 100.64.21.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.136
+ 100.64.2.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.3
+ 100.64.21.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.4
+ 100.64.21.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.15
+ 100.64.11.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.5
+ 100.64.21.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.6
+ 100.64.21.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.7
+ USER-0015-1226.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.184
+ 100.64.5.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.167
+ 100.64.16.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a941010-df99-11ee-b293-9383286c6129
+
+
+
diff --git a/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3038ce2c87829365d8d0923a34af1e5be5f3883
--- /dev/null
+++ b/graph/incidents_graphml/0/0a9b97f0-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.22
+ 100.64.8.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0a9b97f0-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b77f647aeb6cbe80b890a10f460364584ec2217a
--- /dev/null
+++ b/graph/incidents_graphml/0/0aaad680-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.181
+ 100.64.12.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0aaad680-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85ac50eed597ee3c5ea4abf1148fe0f21212b59e
--- /dev/null
+++ b/graph/incidents_graphml/0/0aabc490-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.22
+ 100.64.8.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504599
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0aabc490-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b1c9faf6c4f62d3ec504285ce99bbf6cb56d059
--- /dev/null
+++ b/graph/incidents_graphml/0/0ab41d20-fac9-11ed-ace2-756da26201e9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.203
+ 100.64.12.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684997689
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0ab41d20-fac9-11ed-ace2-756da26201e9
+
+
+
diff --git a/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdb605042c3df7ea3eaa3d3722938fdb4e1b6f1a
--- /dev/null
+++ b/graph/incidents_graphml/0/0ab4de80-df99-11ee-b293-9383286c6129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.251
+ 100.64.20.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710155889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0ab4de80-df99-11ee-b293-9383286c6129
+
+
+
diff --git a/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5ce3209d9666b582ca437b17a435d5fa61a1272
--- /dev/null
+++ b/graph/incidents_graphml/0/0ab6fc40-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.210
+ 100.64.17.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690052
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ab6fc40-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1339ee8050280269e1529cb18ee8ef3b3c2395de
--- /dev/null
+++ b/graph/incidents_graphml/0/0abbf130-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.159
+ 100.64.14.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0abbf130-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..206f2da86c2e2413c4dd18261e89c32bce3c9848
--- /dev/null
+++ b/graph/incidents_graphml/0/0ac6f780-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.243
+ 100.64.56.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193706
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ac6f780-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml b/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df99eeb01c5b298d757528a3838a332b19e9dff5
--- /dev/null
+++ b/graph/incidents_graphml/0/0acbe8f0-df99-11ee-b293-9383286c6129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.30
+ 100.64.14.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710155890
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0acbe8f0-df99-11ee-b293-9383286c6129
+
+
+
diff --git a/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea6ff81409af077fc9e545b81e4ea17bf94b5b35
--- /dev/null
+++ b/graph/incidents_graphml/0/0aceaa00-fac9-11ed-ace2-756da26201e9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.203
+ 100.64.12.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684997689
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0aceaa00-fac9-11ed-ace2-756da26201e9
+
+
+
diff --git a/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc97efb8bd9d6ba660b0400faa425ffb47cb5974
--- /dev/null
+++ b/graph/incidents_graphml/0/0acecdd0-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475393
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0acecdd0-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9d43d721b8b1a766e615cb5290339dde5680841
--- /dev/null
+++ b/graph/incidents_graphml/0/0ad42130-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.212
+ 100.64.17.212
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690052
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0ad42130-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efc02d8ae441e12b7cd12dad619440dd4e7c023a
--- /dev/null
+++ b/graph/incidents_graphml/0/0ad56440-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.170
+ USER-0015-1306.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ad56440-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c83be402041ad1f7af774a3cd03df58e3ffc2108
--- /dev/null
+++ b/graph/incidents_graphml/0/0adbc620-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.198
+ 100.64.41.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0adbc620-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f071525368e7fb839969df0909768804a83f2fe5
--- /dev/null
+++ b/graph/incidents_graphml/0/0ae3ade0-6f7a-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.186.20
+ USER-0015-1825.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.79.232
+ 100.64.79.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1669680547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0ae3ade0-6f7a-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669680547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0ae3ade0-6f7a-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2248bfe9019e906c9199a15d2d001ae890bb40f9
--- /dev/null
+++ b/graph/incidents_graphml/0/0ae68d70-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.243
+ 100.64.56.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193706
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0ae68d70-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04b7435425afdc792618641f173bbd66d87eca60
--- /dev/null
+++ b/graph/incidents_graphml/0/0ae828f0-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.170
+ USER-0015-1306.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121225
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0ae828f0-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87b333c32d191cecfb062f94046dd0a2cbc2a285
--- /dev/null
+++ b/graph/incidents_graphml/0/0ae90c90-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.198
+ 100.64.41.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475394
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0ae90c90-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a921eaf6228e96f96c46a7e7bc8e3e9d6c2dd889
--- /dev/null
+++ b/graph/incidents_graphml/0/0af56f60-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.180
+ 100.64.17.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0af56f60-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6a7025411b79a4f1677fecbad98768ce41d9d68
--- /dev/null
+++ b/graph/incidents_graphml/0/0af667f0-97a6-11ee-964e-058a4cfd3ea1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.126
+ 100.64.48.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702244990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0af667f0-97a6-11ee-964e-058a4cfd3ea1
+
+
+
diff --git a/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml b/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ef35fbc627f65b967bfb47e5d443dcd6cba8b68
--- /dev/null
+++ b/graph/incidents_graphml/0/0aff64c0-a761-11ee-a460-75da98a68a7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.84
+ 100.64.68.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ INCIDENT_LINK
+ 1703974573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0aff64c0-a761-11ee-a460-75da98a68a7c
+
+
+
diff --git a/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f631c77fe7f6a982a61f08fa9c0f2a339921928e
--- /dev/null
+++ b/graph/incidents_graphml/0/0b010cd0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.183
+ 100.64.12.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129122
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0b010cd0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78329a27ee691b6f8018bd26223f089415ed2c1b
--- /dev/null
+++ b/graph/incidents_graphml/0/0b0526d0-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.180
+ 100.64.17.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121225
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b0526d0-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml b/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fa1fca6c1ad6b91e041d292188d29321fb0b866
--- /dev/null
+++ b/graph/incidents_graphml/0/0b07f040-a761-11ee-a460-75da98a68a7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.84
+ 100.64.68.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703974573
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b07f040-a761-11ee-a460-75da98a68a7c
+
+
+
diff --git a/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..115366301bab0a0d62668aad224f76c30884927b
--- /dev/null
+++ b/graph/incidents_graphml/0/0b100e70-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193706
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0b100e70-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52aabd093630d67914147d44b272e0bcdb6871ad
--- /dev/null
+++ b/graph/incidents_graphml/0/0b2224f0-66a8-11ee-8819-db4d49a98ea0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696858242
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b2224f0-66a8-11ee-8819-db4d49a98ea0
+
+
+
diff --git a/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd73a2f19dac8e150cb5a60355dd8dcaac4161f8
--- /dev/null
+++ b/graph/incidents_graphml/0/0b26dc30-f30b-11ee-9a5d-cb0254535644.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712293925
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0b26dc30-f30b-11ee-9a5d-cb0254535644
+
+
+
diff --git a/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a0213785f3b4d80204609f5af64105129bc07e8
--- /dev/null
+++ b/graph/incidents_graphml/0/0b31dc60-66a8-11ee-8819-db4d49a98ea0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696858242
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b31dc60-66a8-11ee-8819-db4d49a98ea0
+
+
+
diff --git a/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..347cfc0825d57b2fd611975c1b3dce66e0b649d0
--- /dev/null
+++ b/graph/incidents_graphml/0/0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.216
+ 100.64.57.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b3ae8d0-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c73492b9ab06d5ae539a7bb39f7d177a6d4f6e06
--- /dev/null
+++ b/graph/incidents_graphml/0/0b3ce000-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.33
+ 100.64.1.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.210
+ 100.64.82.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.211
+ 100.64.82.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.212
+ 100.64.82.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.134
+ 100.64.77.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b3ce000-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3227c0fe44c2027d34c9f8487e9e8739cca9a7d5
--- /dev/null
+++ b/graph/incidents_graphml/0/0b436680-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.94
+ 100.64.21.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b436680-f51c-11ee-a3ea-3503a39e6b10
+
+
+ INCIDENT_LINK
+ 1712521129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b436680-f51c-11ee-a3ea-3503a39e6b10
+
+
+ INCIDENT_LINK
+ 1712521129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b436680-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b75fbc3505a2eec346fbb805edc9037ac6529435
--- /dev/null
+++ b/graph/incidents_graphml/0/0b4a0400-7cbc-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.216
+ 100.64.57.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699285758
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b4a0400-7cbc-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0e3b16f10a5eae3cb7c140ace0aa157fa062f84
--- /dev/null
+++ b/graph/incidents_graphml/0/0b4b0770-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.125
+ 100.64.78.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b4b0770-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad1ea4c82b4a58dc3ae7c3ef7e8bd8b7d30e3ac2
--- /dev/null
+++ b/graph/incidents_graphml/0/0b4b77e0-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.68
+ 100.64.40.68
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0b4b77e0-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c554a2bdecdeef5ab581869ba6aea23c769006eb
--- /dev/null
+++ b/graph/incidents_graphml/0/0b4e7600-18ea-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.220
+ 100.64.95.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1716457896
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b4e7600-18ea-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29f3e0ed10b798560866e43dc39fb4bdb5ab5e37
--- /dev/null
+++ b/graph/incidents_graphml/0/0b5176c0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.185
+ 100.64.12.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129123
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b5176c0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21d32475e613273ead8ac14dc0b5aecf946175e2
--- /dev/null
+++ b/graph/incidents_graphml/0/0b535900-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.77
+ USER-0015-1276.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193707
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b535900-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fe72674b28258c7a4ac1faa73952770cda1e59e
--- /dev/null
+++ b/graph/incidents_graphml/0/0b5a44f0-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.68
+ 100.64.40.68
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0b5a44f0-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35b38cb072a6879d20feec51d094e730c48c7b79
--- /dev/null
+++ b/graph/incidents_graphml/0/0b5fc7f0-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.125
+ 100.64.78.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670663
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b5fc7f0-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d57f68720e7c971719a0cd4cd5b1266a776d0a3f
--- /dev/null
+++ b/graph/incidents_graphml/0/0b61a360-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.185
+ 100.64.12.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129123
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b61a360-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9caae45733180ad19335fe88a9a157b7088d145
--- /dev/null
+++ b/graph/incidents_graphml/0/0b6e46e0-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.126
+ 100.64.78.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b6e46e0-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..336631a638cc5ef1f5e5dff94245de52ff348f54
--- /dev/null
+++ b/graph/incidents_graphml/0/0b747c40-dcec-11ee-a882-b9479a05bea4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.94
+ 100.64.28.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709861685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b747c40-dcec-11ee-a882-b9479a05bea4
+
+
+
diff --git a/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce2e6a3bae7ebe67c5857f3c06b80e271054d9c1
--- /dev/null
+++ b/graph/incidents_graphml/0/0b7af7c0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.187
+ 100.64.12.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129123
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0b7af7c0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1e97bb9cd7d81f38ae25faf3cfd432178f4f7d6
--- /dev/null
+++ b/graph/incidents_graphml/0/0b835580-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.126
+ 100.64.78.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670663
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b835580-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7040091fff7bd8fdba53634100e5a18cbedd4d5e
--- /dev/null
+++ b/graph/incidents_graphml/0/0b845ac0-dcec-11ee-a882-b9479a05bea4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.94
+ 100.64.28.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709861685
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b845ac0-dcec-11ee-a882-b9479a05bea4
+
+
+
diff --git a/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a362e735e615002ae2799defae85b258826431b
--- /dev/null
+++ b/graph/incidents_graphml/0/0b8805c0-3a81-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.112
+ 100.64.41.112
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692003641
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b8805c0-3a81-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692003641
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b8805c0-3a81-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..931cba9f712b258be66e639f512e48d33e66f281
--- /dev/null
+++ b/graph/incidents_graphml/0/0b8a8820-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.187
+ 100.64.12.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129123
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b8a8820-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54e819272e86a371c29de90727fcdb187314993b
--- /dev/null
+++ b/graph/incidents_graphml/0/0b8e1810-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.75
+ 100.64.21.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193707
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b8e1810-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml b/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2feaf19ce1ecba0bcdba6f92f91dd2d6d18299c1
--- /dev/null
+++ b/graph/incidents_graphml/0/0b911910-e92e-11ee-94d2-69297fe1125f.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.85
+ 100.64.47.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711209446
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b911910-e92e-11ee-94d2-69297fe1125f
+
+
+ INCIDENT_LINK
+ 1711209446
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b911910-e92e-11ee-94d2-69297fe1125f
+
+
+
diff --git a/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc4588256375364bd3ad2b1eb24adfe4753471c6
--- /dev/null
+++ b/graph/incidents_graphml/0/0b926480-dcec-11ee-a882-b9479a05bea4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.96
+ 100.64.28.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709861686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b926480-dcec-11ee-a882-b9479a05bea4
+
+
+
diff --git a/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f4f90356035b2fea9342382f356f3eebda9b9ca
--- /dev/null
+++ b/graph/incidents_graphml/0/0b99c960-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.112
+ 100.64.92.112
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.113
+ 100.64.92.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.81.13
+ 100.64.81.13
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.114
+ 100.64.92.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0b99c960-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce727cc2be3e1cb01da71935c5eec2c08f1b3ba7
--- /dev/null
+++ b/graph/incidents_graphml/0/0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.112
+ 100.64.92.112
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001189
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0b9cfdb0-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a849bb04eb21c715ba7f81240caaa6964ed54204
--- /dev/null
+++ b/graph/incidents_graphml/0/0ba06110-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.201
+ 100.64.24.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0ba06110-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1f91693d819df9761117a78ffdb801abdeb4f4c
--- /dev/null
+++ b/graph/incidents_graphml/0/0baa3110-239f-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.95
+ 100.64.20.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717635147
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0baa3110-239f-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b74c71e92e8a82e6ca1fbdd91157bfbce9a4af05
--- /dev/null
+++ b/graph/incidents_graphml/0/0bb18540-dcec-11ee-a882-b9479a05bea4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.98
+ 100.64.28.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709861686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bb18540-dcec-11ee-a882-b9479a05bea4
+
+
+
diff --git a/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0da24119f82570b269e3d129d94171c413cc76b
--- /dev/null
+++ b/graph/incidents_graphml/0/0bb8c8e0-214a-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.57
+ 100.64.20.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.58
+ 100.64.20.58
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.59
+ 100.64.20.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.60
+ USER-0015-1224.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.102
+ 100.64.17.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231240
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bb8c8e0-214a-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5e0bd70af3ef99e603dff3e53da69e91a733345
--- /dev/null
+++ b/graph/incidents_graphml/0/0bc27400-239f-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.95
+ 100.64.20.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717635147
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0bc27400-239f-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml b/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03f0743a68a0f3a77f84ce96326f0c9d419c5f30
--- /dev/null
+++ b/graph/incidents_graphml/0/0bc2ea60-dcec-11ee-a882-b9479a05bea4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.98
+ 100.64.28.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709861686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0bc2ea60-dcec-11ee-a882-b9479a05bea4
+
+
+
diff --git a/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21de1a1734ee8562564a1af023695cbb2388e866
--- /dev/null
+++ b/graph/incidents_graphml/0/0bc45160-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.200
+ USER-0015-1333.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0bc45160-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..066ee7f92a302f93043e9605a1cc916a0e0babad
--- /dev/null
+++ b/graph/incidents_graphml/0/0bc76cc0-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.213
+ 100.64.82.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bc76cc0-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..589f687ec9df0e3ca40c84da1494dff54647e0a1
--- /dev/null
+++ b/graph/incidents_graphml/0/0bc8f360-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.214
+ 100.64.82.214
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.139
+ 100.64.71.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.215
+ 100.64.82.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bc8f360-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bf7b68571498d634547247bbbde4510019bcb76
--- /dev/null
+++ b/graph/incidents_graphml/0/0bca7a00-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,467 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.59
+ 100.64.73.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.93
+ 100.64.73.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.17
+ 100.64.77.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.216
+ 100.64.82.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.127
+ 100.64.72.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.217
+ 100.64.82.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.170
+ 100.64.79.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.218
+ 100.64.82.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.5.111
+ 100.64.5.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.219
+ 100.64.82.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bca7a00-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4b0003580631ba7cdaf13a68a87a0395c476c56
--- /dev/null
+++ b/graph/incidents_graphml/0/0bd2c300-ffec-11ed-97eb-05d23f72b81e.graphml
@@ -0,0 +1,653 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.251
+ 100.64.44.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.44.252
+ 100.64.44.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.253
+ 100.64.44.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.254
+ 100.64.44.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.255
+ 100.64.44.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.16
+ 100.64.43.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.254
+ 100.64.27.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.1
+ 100.64.45.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.84
+ 100.64.41.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.1
+ 100.64.45.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.2
+ 100.64.45.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.3
+ 100.64.45.3
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.4
+ 100.64.45.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+ INCIDENT_LINK
+ 1685562479
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd2c300-ffec-11ed-97eb-05d23f72b81e
+
+
+
diff --git a/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbfd09761ede872d7ceaa9397462f95c7ad341c3
--- /dev/null
+++ b/graph/incidents_graphml/0/0bd2e2c0-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0bd2e2c0-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2154b5c99a7023bea259cdeac6e94831414409c5
--- /dev/null
+++ b/graph/incidents_graphml/0/0bd85680-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.167
+ 100.64.68.167
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.151
+ 100.64.11.151
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595523
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd85680-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595523
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd85680-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595523
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd85680-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595523
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bd85680-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2de6bb98a0efa4501cf10c730c48252abf0a7f54
--- /dev/null
+++ b/graph/incidents_graphml/0/0bde1dd0-01d2-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.59
+ 100.64.30.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.188
+ 100.64.1.188
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.16.98
+ 100.64.16.98
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771215
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bde1dd0-01d2-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd30d445f8376bf4e7434239f803a3a74f8e47c5
--- /dev/null
+++ b/graph/incidents_graphml/0/0bdefad0-4402-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,315 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.33
+ 100.64.62.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.254
+ 100.64.62.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.176
+ 100.64.38.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.175
+ 100.64.42.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.255
+ 100.64.62.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.141
+ 100.64.20.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.1
+ 100.64.63.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.53
+ 100.64.12.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048607
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bdefad0-4402-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60560f3db57867eea145dd7c0f26cd2455382d22
--- /dev/null
+++ b/graph/incidents_graphml/0/0bea20d0-2d79-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.126
+ 100.64.2.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690570841
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0bea20d0-2d79-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec12ad7d1761b279ce926dd103b4ade4eddcd558
--- /dev/null
+++ b/graph/incidents_graphml/0/0bed96b0-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.73
+ 100.64.4.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bed96b0-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f4affcf176a917dfc104fefdf64b583a36696c4
--- /dev/null
+++ b/graph/incidents_graphml/0/0bede230-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.175
+ 100.64.16.175
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689552074
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bede230-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552074
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bede230-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1963242d6bcf46fccb0a9a79eef015b200c769c7
--- /dev/null
+++ b/graph/incidents_graphml/0/0bee04e0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0bee04e0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7e240141a8f98a3351eee3eeea14a64a46c4e81
--- /dev/null
+++ b/graph/incidents_graphml/0/0bf72b90-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.16
+ 100.64.80.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bf72b90-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bf72b90-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a0e1b809504a7f1a300f5e359f952f0f57919e0
--- /dev/null
+++ b/graph/incidents_graphml/0/0bf7da00-ec77-11ee-a77b-a53bbd4435f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.239
+ 100.64.53.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711570654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0bf7da00-ec77-11ee-a77b-a53bbd4435f6
+
+
+
diff --git a/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..712f829acc5b4373cd8fbd25b0b65665c04df1dc
--- /dev/null
+++ b/graph/incidents_graphml/0/0c045980-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.245
+ 100.64.56.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0c045980-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dd8e3ade74db9d166a753ca3fdc19035690a392
--- /dev/null
+++ b/graph/incidents_graphml/0/0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c05f8a0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f5fae7f5c5ed555cd7863fb85e65c0a58ad15c1
--- /dev/null
+++ b/graph/incidents_graphml/0/0c06c400-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.73
+ 100.64.4.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c06c400-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a4647313d45276ae25a9e42eda60356c1f8b247
--- /dev/null
+++ b/graph/incidents_graphml/0/0c074350-ec77-11ee-a77b-a53bbd4435f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.239
+ 100.64.53.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711570654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c074350-ec77-11ee-a77b-a53bbd4435f6
+
+
+
diff --git a/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml b/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60e8240770c55f4bda536f982d8213a96c054429
--- /dev/null
+++ b/graph/incidents_graphml/0/0c2adb60-50fc-11ee-b46e-fdf8dcf22177.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.252
+ 100.64.26.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694475396
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c2adb60-50fc-11ee-b46e-fdf8dcf22177
+
+
+
diff --git a/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml b/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26b9b0f6063385a97301ed1b362509ec8538e7c1
--- /dev/null
+++ b/graph/incidents_graphml/0/0c2b4270-0ec2-11ee-b787-21cb0230290d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.245
+ 100.64.56.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687193708
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c2b4270-0ec2-11ee-b787-21cb0230290d
+
+
+
diff --git a/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dc008c58b0f876bbd88a373e39222c63802f3e5
--- /dev/null
+++ b/graph/incidents_graphml/0/0c30acb0-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.43
+ 100.64.13.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521130
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c30acb0-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdd3da1c157e5bf0f154f6e63d383d1d9b30ca88
--- /dev/null
+++ b/graph/incidents_graphml/0/0c3e0170-742b-11ee-8022-698b2c645bc2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.49.18
+ 172.16.49.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.189
+ 100.64.0.189
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c3e0170-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c3e0170-742b-11ee-8022-698b2c645bc2
+
+
+
diff --git a/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3bf129db5b690875f84488b61dd2d535730077b
--- /dev/null
+++ b/graph/incidents_graphml/0/0c476900-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.43
+ 100.64.13.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0c476900-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48fc924f74274563b9cadb69b7d5a6b8be699be5
--- /dev/null
+++ b/graph/incidents_graphml/0/0c4c8060-742b-11ee-8022-698b2c645bc2.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.186.190
+ 172.31.186.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.77
+ 100.64.87.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.255.161
+ 172.29.255.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.29.5.80
+ 172.29.5.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.89.225
+ 100.64.89.225
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.226
+ 100.64.89.226
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.227
+ 100.64.89.227
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.228
+ 100.64.89.228
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.229
+ 100.64.89.229
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.230
+ 100.64.89.230
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343873
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c4c8060-742b-11ee-8022-698b2c645bc2
+
+
+
diff --git a/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10ddb25907a9e3cde05b6724d54c8aff9878295c
--- /dev/null
+++ b/graph/incidents_graphml/0/0c521fb0-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.78
+ 100.64.30.78
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419430
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0c521fb0-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba435de221bd75167e20b6b48768b2d006a82e44
--- /dev/null
+++ b/graph/incidents_graphml/0/0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.3
+ 100.64.76.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.220
+ 100.64.82.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760201
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5a0fd0-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfaf59238066082dcbf93c263e0b19b694a208a4
--- /dev/null
+++ b/graph/incidents_graphml/0/0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.169.142.210
+ 10.169.142.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.80.172
+ 100.64.80.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.188
+ 100.64.82.188
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666301699
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301699
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301699
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301699
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c5bc5b0-50bf-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1980ea5582fe4c1688def34004af98830c92b4a
--- /dev/null
+++ b/graph/incidents_graphml/0/0c5c0270-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.38
+ 100.64.14.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c5c0270-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbe767f0a0024b8694d2bcb4b1e9ad493904e79f
--- /dev/null
+++ b/graph/incidents_graphml/0/0c622540-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.78
+ 100.64.30.78
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419430
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c622540-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a910a13c5c33c70e3e9a1ea8ba28c8db6438c89c
--- /dev/null
+++ b/graph/incidents_graphml/0/0c642fc0-32e7-11ed-92e6-3b94efab0d7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.79
+ 100.64.97.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1663020344
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c642fc0-32e7-11ed-92e6-3b94efab0d7b
+
+
+
diff --git a/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6cdb9e6749184d432dabfe362932fe158b19b5b
--- /dev/null
+++ b/graph/incidents_graphml/0/0c698e40-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.214
+ 100.64.17.214
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690055
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0c698e40-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf7f4a422a2bb3726fe659209123a65a1231c86f
--- /dev/null
+++ b/graph/incidents_graphml/0/0c6abf70-32e7-11ed-92e6-3b94efab0d7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.97.79
+ 100.64.97.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663020344
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c6abf70-32e7-11ed-92e6-3b94efab0d7b
+
+
+
diff --git a/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2693a9c6a67ae0d6735d1cf02e3cf63f1f91e721
--- /dev/null
+++ b/graph/incidents_graphml/0/0c6c2180-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,251 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.46
+ 100.64.11.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.115
+ 100.64.59.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+ INCIDENT_LINK
+ 1694549699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c6c2180-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa9c29a71c3fc1f6da48728a14e96b7769caf605
--- /dev/null
+++ b/graph/incidents_graphml/0/0c70b2e0-32e7-11ed-92e6-3b94efab0d7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.85
+ 100.64.97.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663020344
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c70b2e0-32e7-11ed-92e6-3b94efab0d7b
+
+
+
diff --git a/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f317064e2b7949dbc317e93471eef6eca7beaa9f
--- /dev/null
+++ b/graph/incidents_graphml/0/0c72e5d0-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.38
+ 100.64.14.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0c72e5d0-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml b/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aadbe9d89835bdb58ac7859e49ee98079dc50ba5
--- /dev/null
+++ b/graph/incidents_graphml/0/0c78a220-32e7-11ed-92e6-3b94efab0d7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.85
+ 100.64.97.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663020344
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c78a220-32e7-11ed-92e6-3b94efab0d7b
+
+
+
diff --git a/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daa6ad2acd8085a793db8cd23e1817f1902dbd37
--- /dev/null
+++ b/graph/incidents_graphml/0/0c81fd20-683e-11ed-96b7-d9d8859696d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668885122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c81fd20-683e-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c81fd20-683e-11ed-96b7-d9d8859696d0
+
+
+
diff --git a/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbfeff8bd522be0eae2c42266fee358bf80303ec
--- /dev/null
+++ b/graph/incidents_graphml/0/0c82f960-9c9e-11ee-b60c-751684393f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.130
+ 100.64.68.130
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702791312
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c82f960-9c9e-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702791312
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c82f960-9c9e-11ee-b60c-751684393f5d
+
+
+
diff --git a/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f398d531397b97a7f336111853d494fa7290bf2c
--- /dev/null
+++ b/graph/incidents_graphml/0/0c874f70-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.43
+ 100.64.11.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690055
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c874f70-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..418346fc07103642e3b2ad8a04c9d89df3c02f53
--- /dev/null
+++ b/graph/incidents_graphml/0/0c8d4a70-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.251
+ 100.64.14.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.207
+ 100.64.10.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.140
+ 100.64.24.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0c8d4a70-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a8530138986f9887bc4f0945d42aeec340cafe2
--- /dev/null
+++ b/graph/incidents_graphml/0/0c932d20-2cec-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.180
+ 100.64.59.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.254
+ 100.64.71.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.236
+ 100.64.82.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690510283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c932d20-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c932d20-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c932d20-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0c932d20-2cec-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8babcc9c96ffc097a938783464585921a15f127f
--- /dev/null
+++ b/graph/incidents_graphml/0/0c975500-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.43
+ 100.64.11.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690055
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c975500-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36610133fe3ba438a59df282f3e470fd336443ac
--- /dev/null
+++ b/graph/incidents_graphml/0/0c9ba250-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.142
+ 100.64.24.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.144
+ 100.64.20.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.143
+ 100.64.24.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583706
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0c9ba250-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d528add3deb0e841a3c8209a646856f3e7c86d31
--- /dev/null
+++ b/graph/incidents_graphml/0/0ca585d0-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.216
+ 100.64.17.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690055
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ca585d0-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a528d5602def1350cc5b50d1a3e7a48391babc32
--- /dev/null
+++ b/graph/incidents_graphml/0/0ca6c920-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0ca6c920-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad3fdb1f88f2db7ec455149b03a640f21186da56
--- /dev/null
+++ b/graph/incidents_graphml/0/0cb0dc20-a79f-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.248
+ 100.64.10.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.249
+ 100.64.10.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.202
+ 100.64.8.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.250
+ 100.64.10.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.251
+ 100.64.10.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.252
+ 100.64.10.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.255
+ 100.64.10.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.1
+ 100.64.11.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.180
+ 100.64.5.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.1
+ 100.64.11.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001205
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb0dc20-a79f-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml b/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..882303419ed7436a3907aeaa60167713c7e59cdb
--- /dev/null
+++ b/graph/incidents_graphml/0/0cb64eb0-ed8d-11ee-a847-a3414fa40fa2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.216
+ 100.64.17.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711690055
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cb64eb0-ed8d-11ee-a847-a3414fa40fa2
+
+
+
diff --git a/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3777e77de3970a27a6ea8442930b68473bb0b5f0
--- /dev/null
+++ b/graph/incidents_graphml/0/0cb65df0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.191
+ 100.64.12.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129125
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0cb65df0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1ba3dae87c9b0c883d9e1f21d7ac624b8cf87de
--- /dev/null
+++ b/graph/incidents_graphml/0/0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.96
+ 100.64.21.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0cbbd5b0-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8030eb4451bfb795e1e985ffd3996cf945f45226
--- /dev/null
+++ b/graph/incidents_graphml/0/0cbd4390-742b-11ee-8022-698b2c645bc2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.147.128
+ 172.26.147.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.14
+ 100.64.87.14
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698343874
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cbd4390-742b-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343874
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cbd4390-742b-11ee-8022-698b2c645bc2
+
+
+
diff --git a/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml b/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3fad3553e073e24d62d49754a2c6f17ceecbf23
--- /dev/null
+++ b/graph/incidents_graphml/0/0cc9bee0-7237-11ee-b711-0bbf36a3b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.191
+ 100.64.12.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698129125
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cc9bee0-7237-11ee-b711-0bbf36a3b18a
+
+
+
diff --git a/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml b/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72063fa50df5d7b709657c7300be038ea036dc14
--- /dev/null
+++ b/graph/incidents_graphml/0/0cd50300-f51c-11ee-a3ea-3503a39e6b10.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.96
+ 100.64.21.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712521131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cd50300-f51c-11ee-a3ea-3503a39e6b10
+
+
+
diff --git a/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb198d31d2ba6186bf345a6fa65fc7b175760106
--- /dev/null
+++ b/graph/incidents_graphml/0/0cd9ff10-2d79-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.206
+ 100.64.46.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690570842
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cd9ff10-2d79-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efc60d038a17908bf7753e33b06ca2d1ee764197
--- /dev/null
+++ b/graph/incidents_graphml/0/0ce97770-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ce97770-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab68aca6a5caa1218510397d4193e2f48a341a97
--- /dev/null
+++ b/graph/incidents_graphml/0/0cf01f10-3fad-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.180
+ 100.64.95.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.181
+ 100.64.95.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.182
+ 100.64.95.182
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.5.103
+ 100.64.5.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0cf01f10-3fad-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..991786e90e446e1273dd7213536eaade636928ce
--- /dev/null
+++ b/graph/incidents_graphml/0/0cf526f0-30ed-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.144
+ USER-0015-1259.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.49
+ 100.64.53.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.154
+ 100.64.19.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.29
+ 100.64.47.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098015
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cf526f0-30ed-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eda66f833d6e20c88d6fd7bbb02e2ffd0204d08a
--- /dev/null
+++ b/graph/incidents_graphml/0/0cfab540-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.172
+ 100.64.35.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121229
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0cfab540-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad08a428f407c2afa21fb2d673b0af7568fc24ed
--- /dev/null
+++ b/graph/incidents_graphml/0/0d0331f0-2d79-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.206
+ 100.64.46.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690570843
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d0331f0-2d79-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2723b720de81e88549d04d6befb4e61647d9640e
--- /dev/null
+++ b/graph/incidents_graphml/0/0d0af990-239f-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.97
+ 100.64.20.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717635149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d0af990-239f-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f79f9bec9bd4a8409008f936290a1ebe5ca5731d
--- /dev/null
+++ b/graph/incidents_graphml/0/0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d1b35d0-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0b2fe1dd3ab1a6c854b02872bed331b0c1dccc7
--- /dev/null
+++ b/graph/incidents_graphml/0/0d1c85c0-239f-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.97
+ 100.64.20.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1717635149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d1c85c0-239f-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbbc76f2818c069d6d3ff60d4f68bd23c5163fc2
--- /dev/null
+++ b/graph/incidents_graphml/0/0d24f840-097e-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.36.85
+ 100.64.36.85
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686614748
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d24f840-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614748
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d24f840-097e-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2ed4981c4dfb01c2d29bcd937a4abe22b7799ad
--- /dev/null
+++ b/graph/incidents_graphml/0/0d2c7380-3d36-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.9.67
+ USER-0015-2057.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.35
+ USER-0015-2058.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720448783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0d2c7380-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0d2c7380-3d36-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce2e23ec910996e9b833efcd92bb6f4973abc2cc
--- /dev/null
+++ b/graph/incidents_graphml/0/0d389880-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0d389880-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..538029c54748b4792a2281d9b0971ad0de54dfc5
--- /dev/null
+++ b/graph/incidents_graphml/0/0d476590-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d476590-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62c1499c5144828803d64c0993fd052482e28a5c
--- /dev/null
+++ b/graph/incidents_graphml/0/0d483580-fac9-11ed-ace2-756da26201e9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.117
+ 100.64.47.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684997693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0d483580-fac9-11ed-ace2-756da26201e9
+
+
+
diff --git a/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5a21bb5f077b79c0ecb5dfb3e014d0ba180905e
--- /dev/null
+++ b/graph/incidents_graphml/0/0d52c090-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.164
+ 100.64.47.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d52c090-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e365f9b09e6181ee65aff530bff268b15c9141f4
--- /dev/null
+++ b/graph/incidents_graphml/0/0d582e70-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d582e70-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ec8ac05726255116ffb7a93d03c10c3ebbaaeff
--- /dev/null
+++ b/graph/incidents_graphml/0/0d624d30-fac9-11ed-ace2-756da26201e9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.47.117
+ 100.64.47.117
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684997693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d624d30-fac9-11ed-ace2-756da26201e9
+
+
+
diff --git a/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aad914c8edd318d3165d35654d6a3b9d755769b2
--- /dev/null
+++ b/graph/incidents_graphml/0/0d66d470-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0d66d470-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e097260f0bfebb62cd185d7350b58766cc18f0d
--- /dev/null
+++ b/graph/incidents_graphml/0/0d74cea0-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.47
+ 100.64.7.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.32
+ 100.64.75.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.27
+ 100.64.21.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.79
+ 100.64.71.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.221
+ 100.64.82.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.222
+ 100.64.82.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.223
+ 100.64.82.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.224
+ 100.64.82.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760202
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d74cea0-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c3162c08377d488002598013fbd15ce9e25cd45
--- /dev/null
+++ b/graph/incidents_graphml/0/0d776f60-3558-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.132.243
+ 172.21.132.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.71
+ USER-0015-2041.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719583777
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d776f60-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583777
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0d776f60-3558-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b9659f578403148b1b54d77271037740ec0e32a
--- /dev/null
+++ b/graph/incidents_graphml/0/0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0da1a3e0-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97e9df4c373818af300ac4ca595cb20303fe39d0
--- /dev/null
+++ b/graph/incidents_graphml/0/0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0dbec8d0-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94bdc30b7c622d5c8c6c4b9419b19a4e5b74dae5
--- /dev/null
+++ b/graph/incidents_graphml/0/0dc882a0-117e-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.226
+ 100.64.14.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.156
+ 100.64.60.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.89
+ 100.64.12.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.1
+ USER-0015-1253.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.241
+ 100.64.17.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494359
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dc882a0-117e-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd143fac4d0d21e48016406c7687da05285e36c2
--- /dev/null
+++ b/graph/incidents_graphml/0/0dce7590-3a25-11ef-898a-03f77eec545d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.166
+ USER-0015-1366.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720111629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0dce7590-3a25-11ef-898a-03f77eec545d
+
+
+
diff --git a/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e534921255bcedf69d9a822c0566dcd3ec48040
--- /dev/null
+++ b/graph/incidents_graphml/0/0dd778e0-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.235.253
+ 172.23.235.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.216
+ 100.64.93.216
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620485
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dd778e0-2f44-11ed-acc5-dbb3944f5f62
+
+
+ INCIDENT_LINK
+ 1662620485
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0dd778e0-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml b/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3d551ab8cd4da053c6fe99dc4b20abce224775e
--- /dev/null
+++ b/graph/incidents_graphml/0/0ddc4190-e92e-11ee-94d2-69297fe1125f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.194
+ 100.64.29.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711209450
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0ddc4190-e92e-11ee-94d2-69297fe1125f
+
+
+
diff --git a/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml b/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e0a4809e6d58c57f885cb603f3437b4722fa36e
--- /dev/null
+++ b/graph/incidents_graphml/0/0de39210-2ede-11ef-bd60-9f7fcaee2ef2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.96
+ 100.64.55.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718871672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0de39210-2ede-11ef-bd60-9f7fcaee2ef2
+
+
+
diff --git a/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ef6aca8d01a3ce6c2b979f7f1de234292a94fbb
--- /dev/null
+++ b/graph/incidents_graphml/0/0de531e0-3a25-11ef-898a-03f77eec545d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.166
+ USER-0015-1366.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720111629
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0de531e0-3a25-11ef-898a-03f77eec545d
+
+
+
diff --git a/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..649a65318a1acd7554831066f8d70928f6398233
--- /dev/null
+++ b/graph/incidents_graphml/0/0df87670-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0df87670-1617-11ee-a56a-d1ac4d0caa4c
+
+
+ INCIDENT_LINK
+ 1687999877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0df87670-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20e928f521617483c926a1afd868fcab6be9ee4b
--- /dev/null
+++ b/graph/incidents_graphml/0/0e026650-5c88-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.85
+ 100.64.69.85
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744991
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e026650-5c88-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..559d77ab616b422838ab7568f4c4ea802b76185a
--- /dev/null
+++ b/graph/incidents_graphml/0/0e03f0f0-e2a3-11ee-8bca-5190faa7db82.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.230
+ 100.64.68.230
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.231
+ 100.64.68.231
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490043
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e03f0f0-e2a3-11ee-8bca-5190faa7db82
+
+
+
diff --git a/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml b/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f30b73b16f7e25c24a5eb7e09b2703a78723c413
--- /dev/null
+++ b/graph/incidents_graphml/0/0e241850-24d3-11ee-8319-ef84a69e2089.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689619938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e241850-24d3-11ee-8319-ef84a69e2089
+
+
+
diff --git a/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c962d0f9d88b1f16788b606432d143e794ed6f47
--- /dev/null
+++ b/graph/incidents_graphml/0/0e2b9460-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999877
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e2b9460-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml b/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..010c8daf2a74f052cde1c6353fe1b0e53eaccb77
--- /dev/null
+++ b/graph/incidents_graphml/0/0e2e0360-24d3-11ee-8319-ef84a69e2089.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689619938
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e2e0360-24d3-11ee-8319-ef84a69e2089
+
+
+
diff --git a/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a8fca1b0d35aecccdb6274fb730f7eb13639c99
--- /dev/null
+++ b/graph/incidents_graphml/0/0e3195c0-7578-11ee-8cab-f39a0af54aaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698486899
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e3195c0-7578-11ee-8cab-f39a0af54aaa
+
+
+
diff --git a/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5189d346f481d0e91c4016242e7925a08e4ac7a3
--- /dev/null
+++ b/graph/incidents_graphml/0/0e59e700-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.222
+ 100.64.59.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e59e700-7825-11ee-8281-459da66dfacb
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e59e700-7825-11ee-8281-459da66dfacb
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e59e700-7825-11ee-8281-459da66dfacb
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e59e700-7825-11ee-8281-459da66dfacb
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e59e700-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5404f1f3e3d1d3d0bdb496eaf5ee6be205f67367
--- /dev/null
+++ b/graph/incidents_graphml/0/0e633640-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e633640-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e29c35b81839692e233bc9974f74427cd67fd04e
--- /dev/null
+++ b/graph/incidents_graphml/0/0e6596a0-456b-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.102
+ 100.64.15.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.192
+ 100.64.25.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.124
+ 100.64.13.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.193
+ 100.64.25.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.194
+ 100.64.25.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.9
+ 100.64.3.9
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693203660
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e6596a0-456b-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06eed4e313b3cb4e088c7959186eb5d8491e367d
--- /dev/null
+++ b/graph/incidents_graphml/0/0e68f450-e2a3-11ee-8bca-5190faa7db82.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.232
+ 100.64.68.232
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.233
+ 100.64.68.233
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710490044
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e68f450-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490044
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e68f450-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490044
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e68f450-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490044
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e68f450-e2a3-11ee-8bca-5190faa7db82
+
+
+
diff --git a/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b8ceecc219159b0a1ca9cb306abc3590ed27a59
--- /dev/null
+++ b/graph/incidents_graphml/0/0e6aafe0-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.222
+ 100.64.59.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e6aafe0-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f97aa005c46ecd64178115ecee036434fe8434a
--- /dev/null
+++ b/graph/incidents_graphml/0/0e740f10-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.248
+ 100.64.61.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e740f10-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7adaf87d255b0b1b2a77497f68aef54b22086940
--- /dev/null
+++ b/graph/incidents_graphml/0/0e7904d0-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678310002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e7904d0-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4645d89b00f6896ff98393595718c7c4c02dee8
--- /dev/null
+++ b/graph/incidents_graphml/0/0e7a8e60-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.222
+ 100.64.59.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0e7a8e60-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64f18c558ff788f81846ae8d98957165a7f052b2
--- /dev/null
+++ b/graph/incidents_graphml/0/0e7cfc70-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678310002
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e7cfc70-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..372fc0205ea94b050050721d11e9c3e61cde9c3f
--- /dev/null
+++ b/graph/incidents_graphml/0/0e87adc0-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.223
+ 100.64.59.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e87adc0-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ec52b460a24e98f5a481d5be1796c5aaab6d91a
--- /dev/null
+++ b/graph/incidents_graphml/0/0e881460-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504605
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0e881460-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml b/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29731d4d2e44cbf0627a73d20e3fed4b462ababd
--- /dev/null
+++ b/graph/incidents_graphml/0/0e9500d0-fac9-11ed-ace2-756da26201e9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684997695
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0e9500d0-fac9-11ed-ace2-756da26201e9
+
+
+
diff --git a/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6e8c4d5657c9d52852045ecc07046666a75dcd0
--- /dev/null
+++ b/graph/incidents_graphml/0/0e954250-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.223
+ 100.64.59.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781104
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e954250-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml b/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5c32b9ef51e9e43b14146edefa80d103541ee0c
--- /dev/null
+++ b/graph/incidents_graphml/0/0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.248
+ 100.64.61.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687999878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e95c7e0-1617-11ee-a56a-d1ac4d0caa4c
+
+
+
diff --git a/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml b/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fde6373994f3b551a54afe57b81369940249350
--- /dev/null
+++ b/graph/incidents_graphml/0/0e97f2e0-5140-11ee-8c6c-911c18a26b28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694504606
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0e97f2e0-5140-11ee-8c6c-911c18a26b28
+
+
+
diff --git a/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9aa4417ce77cb8bac0edd2750375a04595702a2f
--- /dev/null
+++ b/graph/incidents_graphml/0/0e9e1510-1f06-11ee-984e-6dd184c65476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.212
+ 100.64.4.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688982137
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0e9e1510-1f06-11ee-984e-6dd184c65476
+
+
+
diff --git a/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdd4af24bfd7bfbeba135c679149a1a34935c3f6
--- /dev/null
+++ b/graph/incidents_graphml/0/0ea34c10-7825-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.226
+ 100.64.59.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698781105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0ea34c10-7825-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d43efc18b70d1ff93d65cd1b38c994295dd59aa3
--- /dev/null
+++ b/graph/incidents_graphml/0/0ea79240-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.151
+ 100.64.8.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ea79240-de35-11ee-affe-870d7afbe1b0
+
+
+ INCIDENT_LINK
+ 1710002995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ea79240-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d76bcee601d5d21b3c6e4527927941936d537345
--- /dev/null
+++ b/graph/incidents_graphml/0/0eaabe10-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.86.20
+ 100.64.86.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688165664
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0eaabe10-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b29802b8f75b79964f732362aa555d646397aef
--- /dev/null
+++ b/graph/incidents_graphml/0/0eab33f0-50bf-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.199.70
+ USER-0015-1926.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ HOST
+ 192.168.45.70
+ 192.168.45.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666301703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0eab33f0-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0eab33f0-50bf-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3eed5897d6a671fc2c29e8ce26cf28826767edfe
--- /dev/null
+++ b/graph/incidents_graphml/0/0eb10050-50bf-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.189
+ 100.64.82.189
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666301703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0eb10050-50bf-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666301703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0eb10050-50bf-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7df9904223c417edf2cf2b9ffdc7d0c038f10eaf
--- /dev/null
+++ b/graph/incidents_graphml/0/0eb44c60-66a8-11ee-8819-db4d49a98ea0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.175
+ 100.64.62.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696858248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0eb44c60-66a8-11ee-8819-db4d49a98ea0
+
+
+
diff --git a/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05ced1949796abaac4890bf40df724be42f54360
--- /dev/null
+++ b/graph/incidents_graphml/0/0ec5c8a0-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.86
+ 100.64.16.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ec5c8a0-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bf035cb66f39cb7941f45707990996c61e23f63
--- /dev/null
+++ b/graph/incidents_graphml/0/0ed754d0-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.86
+ 100.64.16.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0ed754d0-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dd49230d968ead814f0dd860431f93512d1be2a
--- /dev/null
+++ b/graph/incidents_graphml/0/0ef6c490-2d79-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,381 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.208
+ 100.64.46.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.236
+ 100.64.19.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.209
+ 100.64.46.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.184
+ USER-0015-1360.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.210
+ 100.64.46.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.248
+ 100.64.31.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.61
+ 100.64.28.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.211
+ 100.64.46.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.146
+ 100.64.8.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ef6c490-2d79-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4efe63345408eb186ae97135e9be11d9f8a424d
--- /dev/null
+++ b/graph/incidents_graphml/0/0f1b9770-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.135
+ 100.64.32.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f1b9770-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bb8c59e786ded5954691e62c8941b374afc607c
--- /dev/null
+++ b/graph/incidents_graphml/0/0f1d79e0-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.203
+ 100.64.24.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f1d79e0-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..214106fa308fde18248a3fd1b2a952dc9d8ed387
--- /dev/null
+++ b/graph/incidents_graphml/0/0f297a20-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.43
+ 100.64.10.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f297a20-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9c2852a333c9a31b7f9b5d5764948e6fd82668e
--- /dev/null
+++ b/graph/incidents_graphml/0/0f298570-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.219
+ 100.64.37.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.220
+ 100.64.37.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.221
+ 100.64.37.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.222
+ 100.64.37.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f298570-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml b/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1993355a4927bccfd67897b77bcbb86949729cc7
--- /dev/null
+++ b/graph/incidents_graphml/0/0f29aa90-2771-11ed-9f61-91ab69ba9b3b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.225
+ 100.64.82.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.39
+ 100.64.1.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.84
+ 100.64.82.84
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661760205
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f29aa90-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760205
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f29aa90-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760205
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f29aa90-2771-11ed-9f61-91ab69ba9b3b
+
+
+ INCIDENT_LINK
+ 1661760205
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f29aa90-2771-11ed-9f61-91ab69ba9b3b
+
+
+
diff --git a/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b6a1b4de46019f9714c3d4f2b07a9de50c53f20
--- /dev/null
+++ b/graph/incidents_graphml/0/0f2b86d0-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.24
+ 100.64.86.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688165664
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f2b86d0-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89a9f3ef1b5e0c0b7e857625c496ecbfff7622cf
--- /dev/null
+++ b/graph/incidents_graphml/0/0f2b9730-2632-11ef-bbd8-ff4fc7f3a856.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.249
+ 100.64.2.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717918191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f2b9730-2632-11ef-bbd8-ff4fc7f3a856
+
+
+
diff --git a/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f5a77027d87863c6257a65f27cdd30f551c5947
--- /dev/null
+++ b/graph/incidents_graphml/0/0f2bb660-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.88
+ 100.64.16.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f2bb660-de35-11ee-affe-870d7afbe1b0
+
+
+ INCIDENT_LINK
+ 1710002996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f2bb660-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25dca54d1b3f7ef58ba83d7603478b9edeb5ff8a
--- /dev/null
+++ b/graph/incidents_graphml/0/0f384730-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.43
+ 100.64.10.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f384730-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23aba11e8897f947f9b4ed2d86a64dcf15c49af4
--- /dev/null
+++ b/graph/incidents_graphml/0/0f3e5400-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.88
+ 100.64.16.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0f3e5400-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbba883cdb8dfb3588606ade2d0f4f0e82b4b3fe
--- /dev/null
+++ b/graph/incidents_graphml/0/0f3f0ba0-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.203
+ 100.64.24.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090205
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f3f0ba0-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..763cf3d3e33567d7645fcf9705206d92af87df81
--- /dev/null
+++ b/graph/incidents_graphml/0/0f43ac10-2d79-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.216
+ USER-0015-1361.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690570846
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f43ac10-2d79-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20d1fcb142e6f01e487da72ce0569efe677169c8
--- /dev/null
+++ b/graph/incidents_graphml/0/0f4c1d50-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f4c1d50-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..064c6cfef428a9712a8b3e4e7724ab558e0f8dc8
--- /dev/null
+++ b/graph/incidents_graphml/0/0f54de90-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.1
+ 100.64.74.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.246
+ 100.64.76.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.27
+ 100.64.8.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.247
+ USER-0015-1745.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.67.234
+ 100.64.67.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.82
+ 100.64.18.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.248
+ 100.64.76.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.249
+ 100.64.76.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.250
+ 100.64.76.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.251
+ 100.64.76.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.252
+ 100.64.76.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.65.56
+ 100.64.65.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085480
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f54de90-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd7efb1dedc7717a0ad828275d30101decf2095d
--- /dev/null
+++ b/graph/incidents_graphml/0/0f585720-18e1-11ee-9b6c-2d03eea98951.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688306540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f585720-18e1-11ee-9b6c-2d03eea98951
+
+
+ INCIDENT_LINK
+ 1688306540
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f585720-18e1-11ee-9b6c-2d03eea98951
+
+
+
diff --git a/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af803d5ebde230b170e053591023519c09d2deeb
--- /dev/null
+++ b/graph/incidents_graphml/0/0f5a7180-683e-11ed-96b7-d9d8859696d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.96
+ 100.64.73.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668885127
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f5a7180-683e-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885127
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f5a7180-683e-11ed-96b7-d9d8859696d0
+
+
+
diff --git a/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea1d6bd1e3d874f315ca44473ed2008c612b65e5
--- /dev/null
+++ b/graph/incidents_graphml/0/0f5b2250-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.24
+ 100.64.86.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688165665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f5b2250-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f439bfadd798b9d72942d16921de16b4be358618
--- /dev/null
+++ b/graph/incidents_graphml/0/0f5eb350-45d1-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1693247470
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f5eb350-45d1-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9ad73bcb1cdce05726a376dbaec35f9af47e051
--- /dev/null
+++ b/graph/incidents_graphml/0/0f6d5eb0-9675-11ee-ab9f-854a086fd880.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.117
+ 100.64.47.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.93
+ 100.64.62.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.94
+ 100.64.62.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.12
+ 100.64.36.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.76
+ 100.64.29.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.37
+ 100.64.30.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114000
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f6d5eb0-9675-11ee-ab9f-854a086fd880
+
+
+
diff --git a/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..070d6b1a3f5262b0e99dcb5c0c0b2bab4ba10fba
--- /dev/null
+++ b/graph/incidents_graphml/0/0f6f4360-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090205
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f6f4360-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56d1038cb9615c3ee0024572d6c9ddfdb0391384
--- /dev/null
+++ b/graph/incidents_graphml/0/0f721be0-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.139
+ 100.64.32.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f721be0-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2e04ba14f8b3209a708a63b07f22ff8d93b010a
--- /dev/null
+++ b/graph/incidents_graphml/0/0f8073c0-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.139
+ 100.64.32.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f8073c0-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14aca70e475a024a80a5432134cac48093a9f3e6
--- /dev/null
+++ b/graph/incidents_graphml/0/0f8175f0-5037-11ee-a37e-a35a02afc742.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.209
+ 100.64.70.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694390790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f8175f0-5037-11ee-a37e-a35a02afc742
+
+
+
diff --git a/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77a3029d528256cd2ac16be476cb17cd79b48392
--- /dev/null
+++ b/graph/incidents_graphml/0/0f820ff0-5ab0-11ee-892e-3b87e68adb1a.graphml
@@ -0,0 +1,773 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.238
+ 100.64.36.238
+ ["Exploiting Host"]
+ 0.8576171875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.66
+ 100.64.68.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.67
+ 100.64.68.67
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.84
+ 100.64.12.84
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.68
+ 100.64.68.68
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.64.42
+ 100.64.64.42
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.69
+ 100.64.68.69
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+ INCIDENT_LINK
+ 1695542271
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 0f820ff0-5ab0-11ee-892e-3b87e68adb1a
+
+
+
diff --git a/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml b/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ab227d1ce19ffe74ad34a2ab48185cb6d1bb1a1
--- /dev/null
+++ b/graph/incidents_graphml/0/0f83bfd0-3fe4-11ee-9108-95499536c7df.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.141
+ 100.64.10.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692595924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f83bfd0-3fe4-11ee-9108-95499536c7df
+
+
+
diff --git a/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc7a2c4a128d0043bf1d88ca10ba608f395cb189
--- /dev/null
+++ b/graph/incidents_graphml/0/0f84f860-5037-11ee-a37e-a35a02afc742.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.209
+ 100.64.70.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694390790
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f84f860-5037-11ee-a37e-a35a02afc742
+
+
+
diff --git a/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c35908f7079a23619d31bd61a87a4590b4ea2e96
--- /dev/null
+++ b/graph/incidents_graphml/0/0f892bb0-5dac-11ee-852f-d98ba2bc54fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.5
+ 100.64.81.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695870407
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f892bb0-5dac-11ee-852f-d98ba2bc54fb
+
+
+
diff --git a/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..026e81d7f785d3b406d8478b2d5f82c02db13755
--- /dev/null
+++ b/graph/incidents_graphml/0/0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.145
+ 100.64.49.145
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614039
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f8ad0e0-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ce7866be5767951194888cdd15ffcd7c842b2a1
--- /dev/null
+++ b/graph/incidents_graphml/0/0f936d30-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090205
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0f936d30-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b8f3012322a9e99149ce172581cb9b36adbed95
--- /dev/null
+++ b/graph/incidents_graphml/0/0f95fcf0-5dac-11ee-852f-d98ba2bc54fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.81.5
+ 100.64.81.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695870407
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0f95fcf0-5dac-11ee-852f-d98ba2bc54fb
+
+
+
diff --git a/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77e22562ca014698de8e8d1ede5b091a249a80ef
--- /dev/null
+++ b/graph/incidents_graphml/0/0f990a70-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.36
+ 100.64.1.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686675311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f990a70-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0f990a70-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0979c51102d6e99afe800b3617aff649183233db
--- /dev/null
+++ b/graph/incidents_graphml/0/0fa1a9b0-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.90
+ 100.64.16.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002997
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fa1a9b0-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8959c3b26ee221c53cb869dacbf7f8df5533bad
--- /dev/null
+++ b/graph/incidents_graphml/0/0fa44bd0-73af-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.31
+ 100.64.73.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670143123
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0fa44bd0-73af-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..018c9462347e61c31d6bd31ddddb792314c25b55
--- /dev/null
+++ b/graph/incidents_graphml/0/0fa66c80-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.217
+ 100.64.93.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662620488
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fa66c80-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b67d27cf2d42a57f0e192f8a54883e2dfab76843
--- /dev/null
+++ b/graph/incidents_graphml/0/0faab470-73af-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.31
+ 100.64.73.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.32
+ 100.64.73.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670143123
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0faab470-73af-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cef2addccf6c55089171a26035b7e2693175178
--- /dev/null
+++ b/graph/incidents_graphml/0/0fad9870-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.217
+ 100.64.93.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662620488
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0fad9870-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d0a09f7112745f14d1281c97d8dfa1906106c59
--- /dev/null
+++ b/graph/incidents_graphml/0/0faf2a90-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.117
+ 100.64.92.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678001195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0faf2a90-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0204ba1077cd741ecabcb35ccad4ecb2ec2654cf
--- /dev/null
+++ b/graph/incidents_graphml/0/0faf6140-2cec-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.237
+ 100.64.82.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.53.225
+ 100.64.53.225
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0faf6140-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0faf6140-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0faf6140-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0faf6140-2cec-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..736a68a766eaeef18c2dae3610b1b720d081128d
--- /dev/null
+++ b/graph/incidents_graphml/0/0fb20540-2f44-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.221
+ 100.64.93.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662620488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fb20540-2f44-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml b/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7373038fa7aab7a2c4e715e40c1236e07b2595cb
--- /dev/null
+++ b/graph/incidents_graphml/0/0fb34940-bb27-11ed-b3d4-01a3306b45e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.117
+ 100.64.92.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678001195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fb34940-bb27-11ed-b3d4-01a3306b45e6
+
+
+
diff --git a/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac77c539c8c71ebc3edb580e18030a8e8bf7a92a
--- /dev/null
+++ b/graph/incidents_graphml/0/0fb47c10-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.141
+ 100.64.32.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fb47c10-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml b/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57d3b419d5cc8adedf3947d4bea003fb403f243b
--- /dev/null
+++ b/graph/incidents_graphml/0/0fb88b30-4f29-11ee-8f95-3f205431a8e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.169
+ USER-0015-1299.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694274827
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fb88b30-4f29-11ee-8f95-3f205431a8e8
+
+
+
diff --git a/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..861fe9bc2a576864361b77587eb1f48608a12bab
--- /dev/null
+++ b/graph/incidents_graphml/0/0fb88d10-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.90
+ 100.64.16.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002997
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0fb88d10-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccc0920b74c351a80a564b3260ba34dccfc625ce
--- /dev/null
+++ b/graph/incidents_graphml/0/0fba7d30-0dd1-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090206
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0fba7d30-0dd1-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32ba3b7ac122c9884123c3d793fdcc313693435d
--- /dev/null
+++ b/graph/incidents_graphml/0/0fbbab20-a79f-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.11
+ 100.64.11.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.12
+ 100.64.11.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.14
+ 100.64.11.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.15
+ 100.64.11.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.16
+ 100.64.11.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.17
+ 100.64.11.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.18
+ 100.64.11.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fbbab20-a79f-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40881816a485ee9b832e21e88d51b250b68af7d5
--- /dev/null
+++ b/graph/incidents_graphml/0/0fc210a0-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.141
+ 100.64.32.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0fc210a0-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c443affea3bd1c85c0ab58aa6cd9440996f273ce
--- /dev/null
+++ b/graph/incidents_graphml/0/0fc448d0-2cec-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.238
+ 100.64.82.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0fc448d0-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0fc448d0-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0fc448d0-2cec-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690510288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 0fc448d0-2cec-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4955661e34865091533c36123733c375e7dbb618
--- /dev/null
+++ b/graph/incidents_graphml/0/0fd974b0-214a-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.65
+ 100.64.20.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.66
+ 100.64.20.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.67
+ 100.64.20.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.68
+ 100.64.20.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.69
+ 100.64.20.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.71
+ 100.64.20.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.72
+ 100.64.20.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.73
+ 100.64.20.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.74
+ 100.64.20.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.75
+ 100.64.20.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.76
+ 100.64.20.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.77
+ 100.64.20.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231247
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fd974b0-214a-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..193cb741ebcce32c8ef65c00725a2f4e34c27d86
--- /dev/null
+++ b/graph/incidents_graphml/0/0fde30c0-3d5c-11ef-86a6-4db713805853.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.219
+ 100.64.37.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.186
+ 100.64.42.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720465108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fde30c0-3d5c-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fde30c0-3d5c-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fde30c0-3d5c-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465108
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 0fde30c0-3d5c-11ef-86a6-4db713805853
+
+
+
diff --git a/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..532d87f1c193a3e28e15752a846ad49c7d5470df
--- /dev/null
+++ b/graph/incidents_graphml/0/0fdfda50-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.125
+ 100.64.47.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419436
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0fdfda50-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a81091f23b40b1541b69d9959094bd5bf70a460
--- /dev/null
+++ b/graph/incidents_graphml/0/0fef91c0-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.125
+ 100.64.47.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419436
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 0fef91c0-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml b/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92965636fc1b37fc1172ca666279bc7dcc914033
--- /dev/null
+++ b/graph/incidents_graphml/0/0ffd44e0-898b-11ee-a5cb-3993aaffe494.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.143
+ 100.64.32.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+ INCIDENT_LINK
+ 1700694085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 0ffd44e0-898b-11ee-a5cb-3993aaffe494
+
+
+
diff --git a/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13669a1cbd4a2b7e762fbad7031e74af2904ec55
--- /dev/null
+++ b/graph/incidents_graphml/1/10044a60-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.30
+ 100.64.62.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688041112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10044a60-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10044a60-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc95dd612f0089e1d3a9f0e40e1401a3447e044a
--- /dev/null
+++ b/graph/incidents_graphml/1/1036b490-7578-11ee-8cab-f39a0af54aaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.110
+ 100.64.42.110
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698486902
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1036b490-7578-11ee-8cab-f39a0af54aaa
+
+
+
diff --git a/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml b/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4126fddefebdbb7f66eb981f0588ae1ce6c11ea6
--- /dev/null
+++ b/graph/incidents_graphml/1/1041f100-5ff4-11ee-a4ff-1bc46b312733.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.174
+ 100.64.35.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696121234
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1041f100-5ff4-11ee-a4ff-1bc46b312733
+
+
+
diff --git a/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0102626780e11d1a990dfdc95817d7ad9475b5ed
--- /dev/null
+++ b/graph/incidents_graphml/1/1046ba20-7578-11ee-8cab-f39a0af54aaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.110
+ 100.64.42.110
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698486902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1046ba20-7578-11ee-8cab-f39a0af54aaa
+
+
+
diff --git a/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..151b25d62140e2ac7e711d0a4962d47339a12c93
--- /dev/null
+++ b/graph/incidents_graphml/1/1046ee30-097d-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.55
+ USER-0015-1516.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.178
+ 100.64.69.178
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614324
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1046ee30-097d-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82a7cf65fad11645459f1418984d6844f63603f7
--- /dev/null
+++ b/graph/incidents_graphml/1/10470800-53e9-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.170
+ 100.64.14.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694797096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10470800-53e9-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9766a6b05b8efabb6d0cde33269eadf6722e6c2a
--- /dev/null
+++ b/graph/incidents_graphml/1/105e1130-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.233
+ 100.64.28.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.73
+ USER-0015-1746.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.100
+ 100.64.21.100
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.253
+ 100.64.76.253
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.254
+ 100.64.76.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.56.245
+ 100.64.56.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.255
+ 100.64.76.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.101
+ 100.64.71.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.226
+ 100.64.12.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.86
+ 100.64.76.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.39
+ 100.64.73.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.193
+ 100.64.72.193
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.1
+ 100.64.77.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.26.223
+ 100.64.26.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.9746875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085482
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 105e1130-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1263cb646189ee47e40205fc56fec84a5c53963
--- /dev/null
+++ b/graph/incidents_graphml/1/1064af90-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.94
+ 100.64.13.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072666
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1064af90-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml b/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e21d4717b56852ef2fbbf61add91d9111c61f20e
--- /dev/null
+++ b/graph/incidents_graphml/1/106f8100-de35-11ee-affe-870d7afbe1b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.92
+ 100.64.16.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710002998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 106f8100-de35-11ee-affe-870d7afbe1b0
+
+
+
diff --git a/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d161ae4f5daf2b60a9aa82e388c9e7c2427f9d1b
--- /dev/null
+++ b/graph/incidents_graphml/1/10755160-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.94
+ 100.64.13.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072667
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 10755160-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed1d48d59d675971496d77783f2fc8bc97b081ad
--- /dev/null
+++ b/graph/incidents_graphml/1/10761b40-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.8
+ 100.64.46.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614040
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10761b40-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52abc1f85d22c1c4a857c22cee592be2d30dd022
--- /dev/null
+++ b/graph/incidents_graphml/1/10836b20-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.229
+ 100.64.35.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581156
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10836b20-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba4849ca681ca7ca6d956eaf386a8aecb9b06ed1
--- /dev/null
+++ b/graph/incidents_graphml/1/10836d00-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.242
+ 100.64.11.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10836d00-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac9b44af1f0ad06f81c7b4a93acabef591a7b0ff
--- /dev/null
+++ b/graph/incidents_graphml/1/10861a40-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.94
+ 100.64.13.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072667
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10861a40-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml b/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b01d712710d9a8d23e5964245a1b464a5bb7ed6
--- /dev/null
+++ b/graph/incidents_graphml/1/108bc940-f927-11ec-8816-1bf0e44958da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.43
+ 100.64.14.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.26.252
+ 100.64.26.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656670671
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 108bc940-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670671
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 108bc940-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670671
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 108bc940-f927-11ec-8816-1bf0e44958da
+
+
+ INCIDENT_LINK
+ 1656670671
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 108bc940-f927-11ec-8816-1bf0e44958da
+
+
+
diff --git a/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b565de20b0605d6cdf0f9cc858cb3282689fa84c
--- /dev/null
+++ b/graph/incidents_graphml/1/10961fd0-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.94
+ 100.64.13.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072667
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10961fd0-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c1a9168ae2203efe99f63fbade4bf77a928aabb
--- /dev/null
+++ b/graph/incidents_graphml/1/10971c10-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.242
+ 100.64.11.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061569
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10971c10-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38307497cec8e0a40e2c7c4eda7189f306ac0623
--- /dev/null
+++ b/graph/incidents_graphml/1/109a9ca0-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.229
+ 100.64.35.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 109a9ca0-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c7ef131595b818938c4c3748029cb0a3f9e7af2
--- /dev/null
+++ b/graph/incidents_graphml/1/10a359c0-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.158.15
+ 192.168.158.15
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.26
+ USER-0015-1975.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688165667
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10a359c0-1799-11ee-9bb9-61e0b388f5c0
+
+
+ INCIDENT_LINK
+ 1688165667
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10a359c0-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b45a1136ba879cb4be8afa9a70fa9864804968c1
--- /dev/null
+++ b/graph/incidents_graphml/1/10b51b90-45d1-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.10
+ 100.64.66.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1693247472
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10b51b90-45d1-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247472
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10b51b90-45d1-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml b/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebd329658f7c484ffc8c613a7c1b14898ca6905b
--- /dev/null
+++ b/graph/incidents_graphml/1/10cf65e0-1229-11ed-9c54-d9154f941ac4.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.252
+ 100.64.70.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.254
+ 100.64.70.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+ INCIDENT_LINK
+ 1659420310
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10cf65e0-1229-11ed-9c54-d9154f941ac4
+
+
+
diff --git a/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7462062774db4cb14d2b5adad2ab57bac0a86adf
--- /dev/null
+++ b/graph/incidents_graphml/1/10d38eb0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.146
+ 100.64.12.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10d38eb0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7f5a6c1b25b93b61d0b3f8cf5d00292d2d78e60
--- /dev/null
+++ b/graph/incidents_graphml/1/10d3c510-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072667
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10d3c510-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e48df7bbafca385edd3ccf61b9b49395b612fb2
--- /dev/null
+++ b/graph/incidents_graphml/1/10d6a840-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.145
+ 100.64.96.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.146
+ 100.64.96.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.68.115
+ 100.64.68.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.147
+ 100.64.96.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.235
+ 100.64.95.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.148
+ 100.64.96.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.149
+ 100.64.96.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.150
+ 100.64.96.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.151
+ 100.64.96.151
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.152
+ 100.64.96.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.153
+ 100.64.96.153
+ ["Exploiting Host"]
+ 0.8734375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.154
+ 100.64.96.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.73.223
+ 100.64.73.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.13
+ 100.64.2.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.12.89
+ 100.64.12.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.96.155
+ 100.64.96.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558940
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10d6a840-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef1c6d9ac1164de42c1c40f7755c8f243c330ca6
--- /dev/null
+++ b/graph/incidents_graphml/1/10d7f5a0-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.149
+ 100.64.3.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061570
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10d7f5a0-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3127b1757a282290c4029d7df1c992459a003d8
--- /dev/null
+++ b/graph/incidents_graphml/1/10e04fa0-9675-11ee-ab9f-854a086fd880.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.49
+ 100.64.62.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.163
+ 100.64.22.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.180
+ 100.64.38.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.156
+ 100.64.51.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.66
+ 100.64.40.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.97
+ 100.64.62.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.110
+ 100.64.35.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.98
+ 100.64.62.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.112
+ 100.64.33.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702114003
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e04fa0-9675-11ee-ab9f-854a086fd880
+
+
+
diff --git a/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml b/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5919b2005936daee779f9c498b948dfda015ed3
--- /dev/null
+++ b/graph/incidents_graphml/1/10e42190-3565-11ef-8ae0-3793ba04d7d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719589366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e42190-3565-11ef-8ae0-3793ba04d7d6
+
+
+
diff --git a/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..810421871d815816813a5998cdb40a5eb3e2b98e
--- /dev/null
+++ b/graph/incidents_graphml/1/10e466e0-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072667
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10e466e0-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1f156d30a3d237f178a17cad2f087b943a46392
--- /dev/null
+++ b/graph/incidents_graphml/1/10e87060-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.149
+ 100.64.3.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061570
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 10e87060-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9ecd9a5c9b94c269033bd85f2a66b9e928a46df
--- /dev/null
+++ b/graph/incidents_graphml/1/10e984f0-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ 100.64.21.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.227
+ 100.64.37.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.229
+ 100.64.37.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10e984f0-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a94b737772a08a7464ff4fa003973b79950f79b4
--- /dev/null
+++ b/graph/incidents_graphml/1/10ea0190-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.78
+ 100.64.59.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767032
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 10ea0190-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae2c1ebad43fec75364f6fa6f29a12d45020ca0e
--- /dev/null
+++ b/graph/incidents_graphml/1/10ed67c0-228a-11ef-b3b6-db5488fb138e.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.125
+ 100.64.6.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.36
+ 100.64.27.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.37
+ 100.64.27.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.38
+ 100.64.27.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.39
+ 100.64.27.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.150
+ 100.64.19.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.40
+ 100.64.27.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.41
+ 100.64.27.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.42
+ 100.64.27.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.43
+ 100.64.27.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+ INCIDENT_LINK
+ 1717516185
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10ed67c0-228a-11ef-b3b6-db5488fb138e
+
+
+
diff --git a/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml b/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aec48c199e90e3fa9be00837099dded1a3a5b229
--- /dev/null
+++ b/graph/incidents_graphml/1/10f67110-3565-11ef-8ae0-3793ba04d7d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719589366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 10f67110-3565-11ef-8ae0-3793ba04d7d6
+
+
+
diff --git a/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84754c91653549409c7a7282b305f2cd030cea17
--- /dev/null
+++ b/graph/incidents_graphml/1/10ffa500-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.24
+ 100.64.18.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.233
+ 100.64.37.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10ffa500-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10ffa500-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10ffa500-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 10ffa500-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da19f66584e50484f781f863031391a2a9140f4d
--- /dev/null
+++ b/graph/incidents_graphml/1/11032ee0-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.78
+ 100.64.59.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767032
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11032ee0-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbbd2cf1c4f4269b40d7b6d5e5d915ad0b9892a5
--- /dev/null
+++ b/graph/incidents_graphml/1/11041760-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.40.208
+ 100.64.40.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688165667
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11041760-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c88aa0bd8ae56833929ac2528f75d10b2ad5795a
--- /dev/null
+++ b/graph/incidents_graphml/1/110d2190-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.172
+ 100.64.96.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.4.55
+ 100.64.4.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.173
+ 100.64.96.173
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.174
+ 100.64.96.174
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.175
+ 100.64.96.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.11.207
+ 100.64.11.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.176
+ 100.64.96.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.73.223
+ 100.64.73.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.153
+ 100.64.96.153
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.177
+ 100.64.96.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.5
+ 100.64.15.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.178
+ 100.64.96.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.179
+ 100.64.96.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.180
+ 100.64.96.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.255
+ 100.64.20.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.181
+ 100.64.96.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.182
+ 100.64.96.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.183
+ 100.64.96.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.52.35
+ 100.64.52.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.6.125
+ 100.64.6.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.184
+ 100.64.96.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 110d2190-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e34e39863ca2a4ca01cf39070335ca73f739313
--- /dev/null
+++ b/graph/incidents_graphml/1/11115570-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.7
+ 100.64.22.7
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419438
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11115570-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5241e7f883cb636fc84f547ae5d985aa60573b4
--- /dev/null
+++ b/graph/incidents_graphml/1/11123f80-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.161
+ 100.64.33.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061570
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11123f80-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..886d750a83f169cb3d089d4f7d8aa62c0e8f6d5c
--- /dev/null
+++ b/graph/incidents_graphml/1/111b76a0-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.191
+ 100.64.91.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 111b76a0-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62ffd932ce21d71345a13b20801401be841541e0
--- /dev/null
+++ b/graph/incidents_graphml/1/111cc4f0-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.79
+ 100.64.27.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581157
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 111cc4f0-2d91-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690581157
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 111cc4f0-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ef550ec2ff380925c38e8ce5e24d42d22db6b7e
--- /dev/null
+++ b/graph/incidents_graphml/1/111cf870-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.79
+ 100.64.59.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767032
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 111cf870-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6205519912264ab731e256d1fcc1872fe73d46e6
--- /dev/null
+++ b/graph/incidents_graphml/1/111ed7d0-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.170
+ 100.64.46.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 111ed7d0-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..991a2b2699fb32fa83c737f8c1260e24e55a8fd0
--- /dev/null
+++ b/graph/incidents_graphml/1/1127d2b0-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.191
+ 100.64.91.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1127d2b0-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdf5c4c0437fdbd912dc394d9f8d03ae9ba7b917
--- /dev/null
+++ b/graph/incidents_graphml/1/1129bf20-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.163
+ 100.64.33.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061570
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1129bf20-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e41761f978439a0b51d5cbc8d69551c78241c254
--- /dev/null
+++ b/graph/incidents_graphml/1/112c9370-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.172
+ 100.64.46.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 112c9370-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a563a6f5b31ba4042cff6a39a953e82a079f397d
--- /dev/null
+++ b/graph/incidents_graphml/1/112d2510-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.79
+ 100.64.59.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767032
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 112d2510-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f9d537d78f991db4952b55ffbd8d3dabe692712
--- /dev/null
+++ b/graph/incidents_graphml/1/112e8980-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.107
+ USER-0015-1474.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728787
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 112e8980-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..651b76796221ec18e762beccccc9adea4dbd4503
--- /dev/null
+++ b/graph/incidents_graphml/1/11300e80-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.200
+ 100.64.89.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678310006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11300e80-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a1c905e1b9f71877d59a71afb2ee783e7ec778e
--- /dev/null
+++ b/graph/incidents_graphml/1/11331d50-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.197
+ 100.64.91.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11331d50-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml b/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ffe5b79a852635a19d39c551ec17adb96aadec1
--- /dev/null
+++ b/graph/incidents_graphml/1/113a6ec0-bdf6-11ed-931f-716b6cf5eba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.200
+ 100.64.89.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678310006
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 113a6ec0-bdf6-11ed-931f-716b6cf5eba2
+
+
+
diff --git a/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c8244620971d3f2b9f55d545d984db78891da90
--- /dev/null
+++ b/graph/incidents_graphml/1/113ad620-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.163
+ 100.64.33.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061570
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 113ad620-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d61d8776aab0c72b81166669536489d943857b4f
--- /dev/null
+++ b/graph/incidents_graphml/1/113b6080-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.172
+ 100.64.46.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 113b6080-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6637d72098de58aabb627bdaa7b0c43f636cb5ff
--- /dev/null
+++ b/graph/incidents_graphml/1/1140d8f0-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.197
+ 100.64.91.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1140d8f0-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b006e33981a380507905614579c0311ffc1a01d1
--- /dev/null
+++ b/graph/incidents_graphml/1/1143b5a0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.148
+ 100.64.12.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269475
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 1143b5a0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fdb843ea88de8b01b417c152a1202c1213ca99a
--- /dev/null
+++ b/graph/incidents_graphml/1/114503d0-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.23
+ 100.64.54.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 114503d0-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..752d6e140c7ee5e088c36fa1c65f62040ff95663
--- /dev/null
+++ b/graph/incidents_graphml/1/114639d0-2632-11ef-bbd8-ff4fc7f3a856.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.3
+ 100.64.44.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717918195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 114639d0-2632-11ef-bbd8-ff4fc7f3a856
+
+
+
diff --git a/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55012f5ef792220de5a68b270d293ab946440d3c
--- /dev/null
+++ b/graph/incidents_graphml/1/11465730-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.192
+ 100.64.91.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11465730-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d7e69ed5895f8c1be7dbf69e62fee4e9078460f
--- /dev/null
+++ b/graph/incidents_graphml/1/114de710-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 114de710-2d91-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690581158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 114de710-2d91-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690581158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 114de710-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml b/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26cdf7bb1fd4b2469ed414dcc8c65bed3ba13c46
--- /dev/null
+++ b/graph/incidents_graphml/1/11501b30-1ac7-11ed-9242-7df62b3bf04c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.192
+ 100.64.91.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660367780
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11501b30-1ac7-11ed-9242-7df62b3bf04c
+
+
+
diff --git a/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af48c45cb95807e55d3eca5cbea68e79ad2706f4
--- /dev/null
+++ b/graph/incidents_graphml/1/11504510-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.59.190
+ 172.21.59.190
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.199
+ 100.64.96.199
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.14
+ 100.64.87.14
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.200
+ 100.64.96.200
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558941
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11504510-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml b/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..608a9628155d9e9b36aa0a37d7c61bfabcdd02c6
--- /dev/null
+++ b/graph/incidents_graphml/1/1156dba0-2632-11ef-bbd8-ff4fc7f3a856.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.3
+ 100.64.44.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717918195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1156dba0-2632-11ef-bbd8-ff4fc7f3a856
+
+
+
diff --git a/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd7c52dd64e49e75d56d6398c0747a86d5142dc2
--- /dev/null
+++ b/graph/incidents_graphml/1/1157c880-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.23
+ 100.64.54.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 1157c880-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c793bdb6b7913905fd8fb5b182f63d2de0985b08
--- /dev/null
+++ b/graph/incidents_graphml/1/116c4870-8d60-11ee-9951-411438339097.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.235
+ USER-0015-1311.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.30
+ 100.64.68.30
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.24
+ 100.64.68.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.55.15
+ 100.64.55.15
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.16
+ 100.64.68.16
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.6203125
+ ["Precinct"]
+
+
+ HOST
+ 100.64.68.17
+ 100.64.68.17
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.18
+ 100.64.68.18
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.25
+ 100.64.68.25
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ HOST
+ 100.64.8.23
+ USER-0015-1491.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.32
+ 100.64.68.32
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.33
+ 100.64.68.33
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.34
+ 100.64.68.34
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115424
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 116c4870-8d60-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3df4b02d6b6aee639fd8f4655b318469f960b8d9
--- /dev/null
+++ b/graph/incidents_graphml/1/11726760-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,669 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.1
+ 100.64.77.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.3
+ 100.64.77.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.4
+ 100.64.77.4
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.5
+ 100.64.77.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.6
+ 100.64.77.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.7
+ 100.64.77.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1747.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.39.173
+ 100.64.39.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.55.55
+ 100.64.55.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11726760-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61bf70afe4229f592a7381e6701a3402138398cd
--- /dev/null
+++ b/graph/incidents_graphml/1/117525e0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.148
+ 100.64.12.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269475
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 117525e0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12bcb55f8294f181d6dcdf11a5c8aa6b7125e252
--- /dev/null
+++ b/graph/incidents_graphml/1/117b0960-01d2-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.79.251
+ 100.64.79.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.46.178
+ 100.64.46.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685771224
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 117b0960-01d2-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f3141cbe4e6ff29972f50b8cc72592702043711
--- /dev/null
+++ b/graph/incidents_graphml/1/118298e0-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.35.43.252
+ 10.35.43.252
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Windows Active Directory","Vulnerability Management"]
+
+
+ HOST
+ 100.64.70.69
+ 100.64.70.69
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.70
+ 100.64.70.70
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 10.30.123.149
+ 10.30.123.149
+ []
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.71
+ 100.64.70.71
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.72
+ 100.64.70.72
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.73
+ 100.64.70.73
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.154
+ 100.64.69.154
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.68
+ 100.64.70.68
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.74
+ 100.64.70.74
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.100
+ 100.64.68.100
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.75
+ USER-0015-1577.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0009","TA0010"]
+ ["Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 118298e0-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04ca1bfc98458f1b5b1c6882d60b8890ac10d082
--- /dev/null
+++ b/graph/incidents_graphml/1/118d9c30-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,889 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.201
+ 100.64.96.201
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.179
+ 100.64.96.179
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.202
+ 100.64.96.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.153
+ 100.64.96.153
+ ["Exploiting Host"]
+ 0.9525390625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.203
+ 100.64.96.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.204
+ 100.64.96.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.205
+ 100.64.96.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.206
+ USER-0015-2161.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.207
+ 100.64.96.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.5.188
+ 100.64.5.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.208
+ 100.64.96.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.146
+ 100.64.8.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.209
+ 100.64.96.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.96.210
+ 100.64.96.210
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.211
+ 100.64.96.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.212
+ 100.64.96.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558942
+ malicious
+ 0.9525390625
+ 0.9525390625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 118d9c30-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b12d15147fef82a734d002029f249228712753c6
--- /dev/null
+++ b/graph/incidents_graphml/1/11948ee0-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 11948ee0-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e372878a91e53733457f17d7c4804f3640d3b570
--- /dev/null
+++ b/graph/incidents_graphml/1/119d47f0-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.149
+ 100.64.71.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.9
+ 100.64.77.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.111
+ 100.64.71.111
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.10
+ 100.64.77.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.254
+ 100.64.75.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.222
+ 100.64.9.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d47f0-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7c72012d61c772e33ba78ed09a1266a1dad3113
--- /dev/null
+++ b/graph/incidents_graphml/1/119d5390-42ae-11ee-912e-5fdb65c11aab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.178
+ 100.64.21.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692902588
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 119d5390-42ae-11ee-912e-5fdb65c11aab
+
+
+
diff --git a/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b75ed3e72061938208181b6768a5a79cb329671
--- /dev/null
+++ b/graph/incidents_graphml/1/11a37120-443a-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.174
+ 100.64.46.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693072669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a37120-443a-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c24afd0e002d0c23e592d460a139a0084c29dd2
--- /dev/null
+++ b/graph/incidents_graphml/1/11a4d710-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.25
+ 100.64.54.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813523
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a4d710-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml b/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87ff7d963bc766d6e68b325d7a299d4d05778165
--- /dev/null
+++ b/graph/incidents_graphml/1/11a57ed0-7ab2-11ee-b406-a926e032105b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699061571
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11a57ed0-7ab2-11ee-b406-a926e032105b
+
+
+
diff --git a/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml b/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32d4e5ef4e1d35ccae60fb907a1db9d1ea97bdf2
--- /dev/null
+++ b/graph/incidents_graphml/1/11a61380-1677-11ee-a523-a1913ea7dc39.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.191
+ 100.64.58.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688041114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a61380-1677-11ee-a523-a1913ea7dc39
+
+
+ INCIDENT_LINK
+ 1688041114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a61380-1677-11ee-a523-a1913ea7dc39
+
+
+
diff --git a/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92da456074aeb383d631080a6aa82b2df8432178
--- /dev/null
+++ b/graph/incidents_graphml/1/11a80b90-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.52
+ 100.64.52.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614042
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a80b90-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db481b7a8f3db458748de3e308c3c3c20c476bac
--- /dev/null
+++ b/graph/incidents_graphml/1/11a924f0-18e1-11ee-9b6c-2d03eea98951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.201
+ 100.64.82.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1912.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Umbrella","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688306543
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11a924f0-18e1-11ee-9b6c-2d03eea98951
+
+
+
diff --git a/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f08055a7725e5f24267943e7b7fd39f0a6f935e7
--- /dev/null
+++ b/graph/incidents_graphml/1/11a97c50-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.150
+ 100.64.12.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a97c50-21a3-11ee-86db-6b99d218dc75
+
+
+ INCIDENT_LINK
+ 1689269475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11a97c50-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4a90161b3407bafff0219542aa41f91c0a59781
--- /dev/null
+++ b/graph/incidents_graphml/1/11b03f50-42ae-11ee-912e-5fdb65c11aab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.178
+ 100.64.21.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692902588
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11b03f50-42ae-11ee-912e-5fdb65c11aab
+
+
+
diff --git a/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbbbd386b70261e2e991c7e29e147a8ebbc62ce1
--- /dev/null
+++ b/graph/incidents_graphml/1/11b74da0-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.25
+ 100.64.54.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813523
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 11b74da0-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39806e71908ef3b5f74fb52a81d53006035aba42
--- /dev/null
+++ b/graph/incidents_graphml/1/11b93870-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.82
+ 100.64.59.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11b93870-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c73726f2241306a5c9ca9a326d6c5cc0a2de5d59
--- /dev/null
+++ b/graph/incidents_graphml/1/11c02770-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.52
+ 100.64.52.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614043
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 11c02770-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3bb0d91e9db824c1b1d931ab7100da7301699868
--- /dev/null
+++ b/graph/incidents_graphml/1/11c7b2b0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.150
+ 100.64.12.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 11c7b2b0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d05e3237f6ed62e6c0eef43d60cbab78a39d2e14
--- /dev/null
+++ b/graph/incidents_graphml/1/11ca2860-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.82
+ 100.64.59.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767033
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11ca2860-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d84545ddcd3933837742245bd206d9eaea2a925a
--- /dev/null
+++ b/graph/incidents_graphml/1/11d18c90-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.69
+ 100.64.31.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614043
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11d18c90-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9d2adbed0ea18b1bd9338dc9693ac781c11fc2b
--- /dev/null
+++ b/graph/incidents_graphml/1/11d94390-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.84
+ 100.64.59.84
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767034
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11d94390-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e886c74cfd044d71147050f2ba4164a64145f409
--- /dev/null
+++ b/graph/incidents_graphml/1/11dff7c0-97a6-11ee-964e-058a4cfd3ea1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702245001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11dff7c0-97a6-11ee-964e-058a4cfd3ea1
+
+
+
diff --git a/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..044c784f70f79b856e11bd589c3fc4ac310e3633
--- /dev/null
+++ b/graph/incidents_graphml/1/11e03b10-5dac-11ee-852f-d98ba2bc54fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.48
+ USER-0015-1437.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695870411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11e03b10-5dac-11ee-852f-d98ba2bc54fb
+
+
+
diff --git a/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml b/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..830b79b30326f138a9e46ef72120bf87be1f4a72
--- /dev/null
+++ b/graph/incidents_graphml/1/11e2caa0-ecdc-11ee-9062-4bdc9f994d60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.69
+ 100.64.31.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711614043
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11e2caa0-ecdc-11ee-9062-4bdc9f994d60
+
+
+
diff --git a/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dbda0ca1e4dca6e6ed92f7e57cc6394e94e2ecc
--- /dev/null
+++ b/graph/incidents_graphml/1/11e54510-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11e54510-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml b/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccd1778447fc50e24e7ec2a43633eebed44b184c
--- /dev/null
+++ b/graph/incidents_graphml/1/11e76c00-00af-11ee-a095-f76b898c0626.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.39
+ 100.64.62.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685646241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 11e76c00-00af-11ee-a095-f76b898c0626
+
+
+
diff --git a/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml b/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..237bb717ee994d1773dfe8ba53353d83a4a7962b
--- /dev/null
+++ b/graph/incidents_graphml/1/11ed1720-97a6-11ee-964e-058a4cfd3ea1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702245001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 11ed1720-97a6-11ee-964e-058a4cfd3ea1
+
+
+
diff --git a/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml b/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5560a2ac9345bd4546959f13fd1f0cd0b9ed39b8
--- /dev/null
+++ b/graph/incidents_graphml/1/11f2b1a0-5dac-11ee-852f-d98ba2bc54fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.14.48
+ USER-0015-1437.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695870411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f2b1a0-5dac-11ee-852f-d98ba2bc54fb
+
+
+
diff --git a/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b14e2c347bdfe1c3ebad22f2a149540330dad799
--- /dev/null
+++ b/graph/incidents_graphml/1/11f785d0-179e-11ee-9bde-a75d9ab1122d.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.17
+ 100.64.82.17
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.48
+ 100.64.16.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.18
+ 100.64.82.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.41
+ 100.64.38.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.20.247
+ USER-0015-1910.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.4.225
+ 100.64.4.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167816
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11f785d0-179e-11ee-9bde-a75d9ab1122d
+
+
+
diff --git a/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7557207fd3bdbf16898e3c82e94a87e7689e4e35
--- /dev/null
+++ b/graph/incidents_graphml/1/11fc5740-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.150
+ 100.64.12.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269476
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 11fc5740-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5fd1cc3947567e14f84fc36550913d529a82427d
--- /dev/null
+++ b/graph/incidents_graphml/1/1201ff60-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688165669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 1201ff60-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml b/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..079c179654dc17ee6dd6a87e94a85a62b1f97e0f
--- /dev/null
+++ b/graph/incidents_graphml/1/12033160-00af-11ee-a095-f76b898c0626.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.62.39
+ 100.64.62.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685646241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12033160-00af-11ee-a095-f76b898c0626
+
+
+
diff --git a/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0c180fcf3350dffcc261f732b2c0ed1b5355fbe
--- /dev/null
+++ b/graph/incidents_graphml/1/120a9d60-683e-11ed-96b7-d9d8859696d0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.109
+ 100.64.1.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668885131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 120a9d60-683e-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 120a9d60-683e-11ed-96b7-d9d8859696d0
+
+
+
diff --git a/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee87131f7d5cdfd8fb0c31460eb8c35a913cce31
--- /dev/null
+++ b/graph/incidents_graphml/1/120c4140-1146-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.226.12
+ 192.168.214.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.83.38
+ 100.64.83.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.39
+ 100.64.83.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687470314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 120c4140-1146-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 120c4140-1146-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 120c4140-1146-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 120c4140-1146-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..710c7078b905b69b27f94c78de9ab6362c41c806
--- /dev/null
+++ b/graph/incidents_graphml/1/120e50e0-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.8
+ 100.64.38.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581159
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 120e50e0-2d91-11ee-be2e-730d4c543b4a
+
+
+ INCIDENT_LINK
+ 1690581159
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 120e50e0-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..362363a93320e915db91f32fdb71a4cdbd8b0f0b
--- /dev/null
+++ b/graph/incidents_graphml/1/12175700-1476-11ee-877c-f76402fda8f6.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.250
+ 100.64.47.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.251
+ 100.64.47.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.252
+ 100.64.47.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.96
+ 100.64.21.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.253
+ USER-0015-1371.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.254
+ 100.64.47.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.255
+ 100.64.47.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820783
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12175700-1476-11ee-877c-f76402fda8f6
+
+
+
diff --git a/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92732b6e03f2a82a817edcb69b6bd25ed1c4a941
--- /dev/null
+++ b/graph/incidents_graphml/1/121f9980-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688165669
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 121f9980-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cea1e91c553eac837fdaff97a81089d79b2c2b0
--- /dev/null
+++ b/graph/incidents_graphml/1/122dec40-1476-11ee-877c-f76402fda8f6.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.5
+ 100.64.48.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.6
+ 100.64.48.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.7
+ 100.64.48.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.111
+ 100.64.13.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.8
+ 100.64.48.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.107
+ 100.64.28.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.9
+ 100.64.48.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.10
+ 100.64.48.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.196
+ 100.64.47.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.93
+ 100.64.10.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 122dec40-1476-11ee-877c-f76402fda8f6
+
+
+
diff --git a/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5c78a02a9f15c5afd1dbea3dbfdfc5417ad445d
--- /dev/null
+++ b/graph/incidents_graphml/1/1230a5f0-2d91-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.8
+ 100.64.38.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690581159
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 1230a5f0-2d91-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61e956ea13dafa29111bdd04af7421ecabffd138
--- /dev/null
+++ b/graph/incidents_graphml/1/12383660-629f-11ee-96c6-530c886f4a66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696414584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12383660-629f-11ee-96c6-530c886f4a66
+
+
+
diff --git a/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6aaa5cab9ae71508ea951854648fc8a6c5f96676
--- /dev/null
+++ b/graph/incidents_graphml/1/123abfd0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.151
+ 100.64.12.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 123abfd0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab706c2d029d55689f68d3acb488631591f22b0b
--- /dev/null
+++ b/graph/incidents_graphml/1/123da070-5992-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.52
+ 100.64.52.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695419440
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 123da070-5992-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a157aac357229b4c7ee54927087d644b6a62523
--- /dev/null
+++ b/graph/incidents_graphml/1/12448180-1476-11ee-877c-f76402fda8f6.graphml
@@ -0,0 +1,653 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.17
+ 100.64.48.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.18
+ 100.64.48.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.165
+ 100.64.33.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.19
+ 100.64.48.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.20
+ 100.64.48.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.21
+ 100.64.48.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.22
+ 100.64.48.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.23
+ 100.64.48.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.29
+ 100.64.39.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.24
+ 100.64.48.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+ INCIDENT_LINK
+ 1687820784
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12448180-1476-11ee-877c-f76402fda8f6
+
+
+
diff --git a/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f150b871d773cd6817fc851eeb8eabb4db4da2ad
--- /dev/null
+++ b/graph/incidents_graphml/1/125188f0-2d7d-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.209
+ 100.64.93.209
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718720067
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 125188f0-2d7d-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718720067
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 125188f0-2d7d-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4934e996e3f28920808571b86adcee149a514909
--- /dev/null
+++ b/graph/incidents_graphml/1/126949e0-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.151
+ 100.64.12.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 126949e0-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7c6baa23b7fbb4092478cf016c7949b8dfb1aed
--- /dev/null
+++ b/graph/incidents_graphml/1/12699cb0-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.86
+ 100.64.59.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767034
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12699cb0-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0d8d69aa0eae775a8dad1e6513bc638ef5239c0
--- /dev/null
+++ b/graph/incidents_graphml/1/12775670-1799-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.34.239
+ 100.64.34.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688165670
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12775670-1799-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml b/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4ca76abe1af6db3a60e3876888f51e493dd5555
--- /dev/null
+++ b/graph/incidents_graphml/1/127bc520-53a3-11ee-92c0-676940819256.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.86
+ 100.64.59.86
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694767035
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 127bc520-53a3-11ee-92c0-676940819256
+
+
+
diff --git a/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3fdd420bdbecc4fe3103bd7c6a0acdb2a66168e
--- /dev/null
+++ b/graph/incidents_graphml/1/12820560-3ca7-11ee-874c-c948d9dda210.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.244
+ 100.64.47.244
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.144.233.147
+ 10.144.233.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692239876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12820560-3ca7-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239876
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12820560-3ca7-11ee-874c-c948d9dda210
+
+
+
diff --git a/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a7f3ec00156beae48c2a5be5f63d67a5b28880f
--- /dev/null
+++ b/graph/incidents_graphml/1/12839230-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.109
+ 100.64.66.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728789
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12839230-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5a6bd5871537fb6cd7491bd6c14e0aba7f4d677
--- /dev/null
+++ b/graph/incidents_graphml/1/12882960-4523-11ef-b505-f5f313488713.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.57.69
+ USER-0015-2027.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.22
+ 100.64.89.22
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721320241
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12882960-4523-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320241
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12882960-4523-11ef-b505-f5f313488713
+
+
+
diff --git a/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c31ce040985d2329b8d9a35b6c57a39654a4b76
--- /dev/null
+++ b/graph/incidents_graphml/1/128a7030-5037-11ee-a37e-a35a02afc742.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694390795
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 128a7030-5037-11ee-a37e-a35a02afc742
+
+
+
diff --git a/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml b/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed2d75e3e8898760757a962604d0acbd890bd7f9
--- /dev/null
+++ b/graph/incidents_graphml/1/128df2a0-5037-11ee-a37e-a35a02afc742.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694390795
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 128df2a0-5037-11ee-a37e-a35a02afc742
+
+
+
diff --git a/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b25e6d00c6c6c67e7fa35ad81f8e499fb965dc6b
--- /dev/null
+++ b/graph/incidents_graphml/1/12931900-21a3-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.153
+ 100.64.12.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689269477
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12931900-21a3-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebf284c94f7d347944f1ec75ee673aa5c075799d
--- /dev/null
+++ b/graph/incidents_graphml/1/12948220-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.109
+ 100.64.66.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728789
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12948220-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..266a9c606dd0c42cdbf958d7594da3faa90a8f3c
--- /dev/null
+++ b/graph/incidents_graphml/1/12a39d50-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.111
+ 100.64.66.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728789
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12a39d50-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a875f50f5c0f555afac335fd2e5c077c0eaaaff5
--- /dev/null
+++ b/graph/incidents_graphml/1/12a75b10-18e1-11ee-9b6c-2d03eea98951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.147
+ 100.64.39.147
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688306545
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12a75b10-18e1-11ee-9b6c-2d03eea98951
+
+
+
diff --git a/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29308af673346342a3cb3501f13415897401c68c
--- /dev/null
+++ b/graph/incidents_graphml/1/12aeb470-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.52
+ 100.64.30.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12aeb470-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12aeb470-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml b/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0aba79642355ce30244850430cb69e6b31da33c5
--- /dev/null
+++ b/graph/incidents_graphml/1/12b1b330-faab-11ec-91ba-ebd515403398.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.250
+ USER-0015-1648.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.178
+ 100.64.72.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656837320
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b1b330-faab-11ec-91ba-ebd515403398
+
+
+
diff --git a/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml b/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd7bad83330c260215f81e6db4964f18da7840d5
--- /dev/null
+++ b/graph/incidents_graphml/1/12b2df90-2479-11ef-9c3a-fbc580c1c3cc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.111
+ 100.64.66.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717728789
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12b2df90-2479-11ef-9c3a-fbc580c1c3cc
+
+
+
diff --git a/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml b/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32a2e1a4a963a4b900e582fe62a1d5feecae8b44
--- /dev/null
+++ b/graph/incidents_graphml/1/12b5c580-706e-11ee-bf4b-5f6b66a218e8.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.246
+ 100.64.22.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.182
+ 100.64.68.182
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.48.110
+ 100.64.48.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.250
+ 100.64.22.250
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.34.181
+ 100.64.34.181
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+ INCIDENT_LINK
+ 1697932855
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12b5c580-706e-11ee-bf4b-5f6b66a218e8
+
+
+
diff --git a/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml b/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8864bfd5ca800e0c5168c503773a8fcf9bdb5334
--- /dev/null
+++ b/graph/incidents_graphml/1/12b6c460-18e1-11ee-9b6c-2d03eea98951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.39.147
+ 100.64.39.147
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688306545
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12b6c460-18e1-11ee-9b6c-2d03eea98951
+
+
+
diff --git a/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfbbe1304c7f3564dd646593dd0011f566d79afe
--- /dev/null
+++ b/graph/incidents_graphml/1/12c6a110-2a33-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.83
+ USER-0015-1509.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690210934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12c6a110-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12c6a110-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12c6a110-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12c6a110-2a33-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa56f7af564b5a17e88469d74e114b43da07b04e
--- /dev/null
+++ b/graph/incidents_graphml/1/12d04060-f6c9-11ec-8331-939c614e3579.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.239
+ 100.64.80.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.57
+ 100.64.72.57
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d04060-f6c9-11ec-8331-939c614e3579
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d04060-f6c9-11ec-8331-939c614e3579
+
+
+
diff --git a/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e4c9b744ff5bd7cf67d63161f793f22f477defb
--- /dev/null
+++ b/graph/incidents_graphml/1/12d1ee10-f6c9-11ec-8331-939c614e3579.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.240
+ 100.64.80.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.90
+ USER-0015-1841.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d1ee10-f6c9-11ec-8331-939c614e3579
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d1ee10-f6c9-11ec-8331-939c614e3579
+
+
+
diff --git a/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..805756b5e21ef2faae1216de9e08688a7dd88006
--- /dev/null
+++ b/graph/incidents_graphml/1/12d39bc0-f6c9-11ec-8331-939c614e3579.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.241
+ 100.64.80.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d39bc0-f6c9-11ec-8331-939c614e3579
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 12d39bc0-f6c9-11ec-8331-939c614e3579
+
+
+
diff --git a/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml b/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdb275fec61a337c42a040dceaab4297e34f483a
--- /dev/null
+++ b/graph/incidents_graphml/1/12d48f70-0dc6-11ee-a3ba-756feea53057.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.11
+ 100.64.77.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.12
+ 100.64.77.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.56.253
+ 100.64.56.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.30.50
+ 100.64.30.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.216
+ HOST-13084
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+ INCIDENT_LINK
+ 1687085486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12d48f70-0dc6-11ee-a3ba-756feea53057
+
+
+
diff --git a/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml b/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ae688961f8d6be4b371239f669916edfa26de5f
--- /dev/null
+++ b/graph/incidents_graphml/1/12d4c230-37cd-11ed-bbec-5f46a95001da.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.231
+ 100.64.96.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.96.232
+ 100.64.96.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.181
+ 100.64.96.181
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.233
+ 100.64.96.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.234
+ 100.64.96.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.157
+ 100.64.96.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.149
+ 100.64.96.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.235
+ 100.64.96.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.236
+ 100.64.96.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.237
+ 100.64.96.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.238
+ 100.64.96.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.228
+ 100.64.7.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.31
+ 100.64.83.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.239
+ 100.64.96.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.240
+ 100.64.96.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.241
+ 100.64.96.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.153
+ 100.64.96.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.242
+ 100.64.96.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+ INCIDENT_LINK
+ 1663558944
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12d4c230-37cd-11ed-bbec-5f46a95001da
+
+
+
diff --git a/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml b/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f120a876fbf9f01fd4bbf909df84e94c959c9ef
--- /dev/null
+++ b/graph/incidents_graphml/1/12dad460-1f06-11ee-984e-6dd184c65476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.7
+ 100.64.22.7
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688982144
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12dad460-1f06-11ee-984e-6dd184c65476
+
+
+
diff --git a/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91e20c31a7de633820fb27cff62452a3827b3ec5
--- /dev/null
+++ b/graph/incidents_graphml/1/12dc93c0-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.128
+ 100.64.49.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12dc93c0-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8a685854c8dc17c82d46739f4b26484b53deca3
--- /dev/null
+++ b/graph/incidents_graphml/1/12df4bd0-629f-11ee-96c6-530c886f4a66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.52
+ 100.64.29.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696414585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12df4bd0-629f-11ee-96c6-530c886f4a66
+
+
+
diff --git a/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml b/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c78cc7cfb34ef71bcb5f8dc1c071de84deeb6e9b
--- /dev/null
+++ b/graph/incidents_graphml/1/12eedc30-629f-11ee-96c6-530c886f4a66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.59
+ 100.64.16.59
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696414585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12eedc30-629f-11ee-96c6-530c886f4a66
+
+
+
diff --git a/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5e55dbd8995c6604bf711d10c5a3ecba0df4cd1
--- /dev/null
+++ b/graph/incidents_graphml/1/12efaf40-f6c9-11ec-8331-939c614e3579.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.171
+ USER-0015-1791.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 12efaf40-f6c9-11ec-8331-939c614e3579
+
+
+
diff --git a/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml b/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cbe95add3bd91bd0463ebb9506cb9cf5ea1ae23
--- /dev/null
+++ b/graph/incidents_graphml/1/12f042d0-a5ea-11ee-87e0-bf05437911b6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.128
+ 100.64.49.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703813525
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 12f042d0-a5ea-11ee-87e0-bf05437911b6
+
+
+
diff --git a/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml b/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6dd4dae40bc55d77a3aec6e11e4411341ffa4b8
--- /dev/null
+++ b/graph/incidents_graphml/1/12f55490-f6c9-11ec-8331-939c614e3579.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.171
+ USER-0015-1791.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656410400
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 12f55490-f6c9-11ec-8331-939c614e3579
+
+
+